5
CVSSv2

CVE-2015-0294

Published: 27/01/2020 Updated: 31/01/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

GnuTLS prior to 3.3.13 does not validate that the signature algorithms match when importing a certificate.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu gnutls

debian debian linux 7.0

redhat enterprise linux 5.0

redhat enterprise linux 7.0

Vendor Advisories

Debian Bug report logs - #779428 gnutls28: CVE-2015-0294: certificate algorithm consistency checking issue Package: src:gnutls28; Maintainer for src:gnutls28 is Debian GnuTLS Maintainers <pkg-gnutls-maint@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 28 Feb 2015 12:57:02 UT ...
Several security issues were fixed in GnuTLS ...
It was found that GnuTLS did not check activation and expiration dates of CA certificates This could cause an application using GnuTLS to incorrectly accept a certificate as valid when its issuing CA is already expired (CVE-2014-8155) It was found that GnuTLS did not verify whether a hashing algorithm listed in a signature matched the hashing alg ...
Impact: Low Public Date: 2015-02-27 CWE: CWE-295 Bugzilla: 1196323: CVE-2015-0294 gnutls: certificate a ...