4.3
CVSSv2

CVE-2014-8155

Published: 14/08/2015 Updated: 13/02/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

GnuTLS prior to 2.9.10 does not verify the activation and expiration dates of CA certificates, which allows man-in-the-middle malicious users to spoof servers via a certificate issued by a CA certificate that is (1) not yet valid or (2) no longer valid.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu gnutls

Vendor Advisories

Debian Bug report logs - #779428 gnutls28: CVE-2015-0294: certificate algorithm consistency checking issue Package: src:gnutls28; Maintainer for src:gnutls28 is Debian GnuTLS Maintainers <pkg-gnutls-maint@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 28 Feb 2015 12:57:02 UT ...
Several security issues were fixed in GnuTLS ...
It was found that GnuTLS did not check activation and expiration dates of CA certificates This could cause an application using GnuTLS to incorrectly accept a certificate as valid when its issuing CA is already expired (CVE-2014-8155) It was found that GnuTLS did not verify whether a hashing algorithm listed in a signature matched the hashing alg ...