CVE-2016-7444

The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*

History

21 Nov 2024, 02:58

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html -
References () http://www.securityfocus.com/bid/92893 - () http://www.securityfocus.com/bid/92893 -
References () https://access.redhat.com/errata/RHSA-2017:2292 - () https://access.redhat.com/errata/RHSA-2017:2292 -
References () https://gitlab.com/gnutls/gnutls/commit/964632f37dfdfb914ebc5e49db4fa29af35b1de9 - Patch () https://gitlab.com/gnutls/gnutls/commit/964632f37dfdfb914ebc5e49db4fa29af35b1de9 - Patch
References () https://lists.gnupg.org/pipermail/gnutls-devel/2016-September/008146.html - Mailing List, Third Party Advisory () https://lists.gnupg.org/pipermail/gnutls-devel/2016-September/008146.html - Mailing List, Third Party Advisory
References () https://www.gnutls.org/security.html - Vendor Advisory () https://www.gnutls.org/security.html - Vendor Advisory

Information

Published : 2016-09-27 15:59

Updated : 2025-04-12 10:46


NVD link : CVE-2016-7444

Mitre link : CVE-2016-7444

CVE.ORG link : CVE-2016-7444


JSON object : View

Products Affected

gnu

  • gnutls
CWE
CWE-264

Permissions, Privileges, and Access Controls