CVE Vulnerabilities

CVE-2016-7444

Published: Sep 27, 2016 | Modified: Jan 05, 2018
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
4.3 LOW
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V3
5.3 LOW
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Ubuntu
LOW

The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.

Affected Software

Name Vendor Start Version End Version
Gnutls Gnu * 3.4.14 (including)
Gnutls Gnu 3.5.0 (including) 3.5.0 (including)
Gnutls Gnu 3.5.1 (including) 3.5.1 (including)
Gnutls Gnu 3.5.2 (including) 3.5.2 (including)
Gnutls Gnu 3.5.3 (including) 3.5.3 (including)
Red Hat Enterprise Linux 7 RedHat gnutls-0:3.3.26-9.el7 *
Gnutls28 Ubuntu trusty *
Gnutls28 Ubuntu upstream *
Gnutls28 Ubuntu vivid/stable-phone-overlay *
Gnutls28 Ubuntu vivid/ubuntu-core *
Gnutls28 Ubuntu xenial *

References