Show plain JSON{"id": "CVE-2016-7444", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": true, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2016-09-27T15:59:12.517", "references": [{"url": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html", "source": "security@debian.org"}, {"url": "http://www.securityfocus.com/bid/92893", "source": "security@debian.org"}, {"url": "https://access.redhat.com/errata/RHSA-2017:2292", "source": "security@debian.org"}, {"url": "https://gitlab.com/gnutls/gnutls/commit/964632f37dfdfb914ebc5e49db4fa29af35b1de9", "tags": ["Patch"], "source": "security@debian.org"}, {"url": "https://lists.gnupg.org/pipermail/gnutls-devel/2016-September/008146.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "security@debian.org"}, {"url": "https://www.gnutls.org/security.html", "tags": ["Vendor Advisory"], "source": "security@debian.org"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/92893", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://access.redhat.com/errata/RHSA-2017:2292", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://gitlab.com/gnutls/gnutls/commit/964632f37dfdfb914ebc5e49db4fa29af35b1de9", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.gnupg.org/pipermail/gnutls-devel/2016-September/008146.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.gnutls.org/security.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-264"}]}], "descriptions": [{"lang": "en", "value": "The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc."}, {"lang": "es", "value": "La funci\u00f3n gnutls_ocsp_resp_check_crt en lib/x509/ocsp.c en GnuTLS en versiones anteriores a 3.4.15 y 3.5.x en versiones anteriores a 3.5.4 no verifica la longitud de serie de una respuesta OCSP, lo que podr\u00eda permitir a atacantes remotos eludir un mecanismo de validaci\u00f3n destinada a certificados a trav\u00e9s de vectores que involucran bytes finales dejados por gnutls_malloc."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE2AE755-9003-4174-8F45-229FDE69B514", "versionEndIncluding": "3.4.14"}, {"criteria": "cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2434168D-05A8-4300-9069-C55566A5EAA0"}, {"criteria": "cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BACD6E9A-8CCA-44C3-AE54-BAABEAB5BB37"}, {"criteria": "cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D6FA626-AEE9-4E3B-8BE4-3F2D46FF072D"}, {"criteria": "cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCA302AC-1DE9-4D36-94B2-BB4411E9BF53"}], "operator": "OR"}]}], "sourceIdentifier": "security@debian.org"}