7.5
CVSSv2

CVE-2010-0731

Published: 26/03/2010 Updated: 19/09/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The gnutls_x509_crt_get_serial function in the GnuTLS library prior to 1.2.1, when running on big-endian, 64-bit platforms, calls the asn1_read_value with a pointer to the wrong data type and the wrong length value, which allows remote malicious users to bypass the certificate revocation list (CRL) check and cause a stack-based buffer overflow via a crafted X.509 certificate, related to extraction of a serial number.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu gnutls 1.1.21

gnu gnutls 1.1.20

gnu gnutls 1.1.13

gnu gnutls 1.0.22

gnu gnutls 1.0.24

gnu gnutls 1.0.25

gnu gnutls 1.1.23

gnu gnutls 1.1.22

gnu gnutls 1.1.15

gnu gnutls 1.1.14

gnu gnutls 1.0.16

gnu gnutls 1.0.17

gnu gnutls

gnu gnutls 1.1.17

gnu gnutls 1.1.16

gnu gnutls 1.0.18

gnu gnutls 1.0.19

gnu gnutls 1.1.19

gnu gnutls 1.1.18

gnu gnutls 1.0.23

gnu gnutls 1.0.20

gnu gnutls 1.0.21

Vendor Advisories

Synopsis Moderate: gnutls security update Type/Severity Security Advisory: Moderate Topic Updated gnutls packages that fix two security issues are now available forRed Hat Enterprise Linux 4The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulnerability Scor ...