7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.006 Low
EPSS
Percentile
78.6%
The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before
3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP
response, which might allow remote attackers to bypass an intended
certificate validation mechanism via vectors involving trailing bytes left
by gnutls_malloc.
lists.gnutls.org/pipermail/gnutls-devel/2016-September/008146.html
www.openwall.com/lists/oss-security/2016/09/18/3
gnutls.org/security.html#GNUTLS-SA-2016-3
launchpad.net/bugs/cve/CVE-2016-7444
nvd.nist.gov/vuln/detail/CVE-2016-7444
security-tracker.debian.org/tracker/CVE-2016-7444
ubuntu.com/security/notices/USN-3183-1
www.cve.org/CVERecord?id=CVE-2016-7444
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.006 Low
EPSS
Percentile
78.6%