5
CVSSv2

CVE-2015-0282

Published: 24/03/2015 Updated: 05/01/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

GnuTLS prior to 3.1.0 does not verify that the RSA PKCS #1 signature algorithm matches the signature algorithm in the certificate, which allows remote malicious users to conduct downgrade attacks via unspecified vectors.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu gnutls

Vendor Advisories

Several security issues were fixed in GnuTLS ...
It was found that GnuTLS did not check activation and expiration dates of CA certificates This could cause an application using GnuTLS to incorrectly accept a certificate as valid when its issuing CA is already expired (CVE-2014-8155) It was found that GnuTLS did not verify whether a hashing algorithm listed in a signature matched the hashing alg ...
It was found that GnuTLS did not verify whether a hashing algorithm listed in a signature matched the hashing algorithm listed in the certificate An attacker could create a certificate that used a different hashing algorithm than it claimed, possibly causing GnuTLS to use an insecure, disallowed hashing algorithm during certificate verification ...