Cryptographic Issues Affecting gnutls28 package, versions <3.0.17-2
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-GNUTLS28-340743
- published 26 Mar 2012
- disclosed 26 Mar 2012
Introduced: 26 Mar 2012
CVE-2012-1573 Open this link in a new tabHow to fix?
Upgrade Debian:10
gnutls28
to version 3.0.17-2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnutls28
package and not the gnutls28
package as distributed by Debian
.
See How to fix?
for Debian:10
relevant fixed versions and status.
gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structure.
References
- https://security-tracker.debian.org/tracker/CVE-2012-1573
- http://www.debian.org/security/2012/dsa-2441
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077071.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076496.html
- http://archives.neohapsis.com/archives/bugtraq/2012-03/0099.html
- http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5910
- http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5912
- http://blog.mudynamics.com/2012/03/20/gnutls-and-libtasn1-vulns/
- http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commit;h=422214868061370aeeb0ac9cd0f021a5c350a57d
- http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commit;h=b495740f2ff66550ca9395b3fda3ea32c3acb185
- http://osvdb.org/80259
- http://www.gnu.org/software/gnutls/security.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html
- http://www.openwall.com/lists/oss-security/2012/03/21/4
- http://www.openwall.com/lists/oss-security/2012/03/21/5
- https://bugzilla.redhat.com/show_bug.cgi?id=805432
- http://rhn.redhat.com/errata/RHSA-2012-0429.html
- http://rhn.redhat.com/errata/RHSA-2012-0488.html
- http://rhn.redhat.com/errata/RHSA-2012-0531.html
- http://secunia.com/advisories/48488
- http://secunia.com/advisories/48511
- http://secunia.com/advisories/48596
- http://secunia.com/advisories/48712
- http://secunia.com/advisories/57260
- http://www.securityfocus.com/bid/52667
- http://www.securitytracker.com/id?1026828
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2012-1573
- http://www.ubuntu.com/usn/USN-1418-1
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:040
- http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba=commit%3Bh=422214868061370aeeb0ac9cd0f021a5c350a57d
- http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba=commit%3Bh=b495740f2ff66550ca9395b3fda3ea32c3acb185