7.5
CVSSv3

CVE-2016-7444

Published: 27/09/2016 Updated: 05/01/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS prior to 3.4.15 and 3.5.x prior to 3.5.4 does not verify the serial length of an OCSP response, which might allow remote malicious users to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu gnutls

gnu gnutls 3.5.1

gnu gnutls 3.5.0

gnu gnutls 3.5.3

gnu gnutls 3.5.2

Vendor Advisories

Synopsis Moderate: gnutls security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for gnutls is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring Syst ...
GnuTLS could be made to hang if it received specially crafted network traffic ...
Several security issues were fixed in GnuTLS ...
A flaw was found in the way GnuTLS validated certificates using OCSP responses This could falsely report a certificate as valid under certain circumstances ...
Incorrect length validation on gnutls's gnutls_ocsp_resp_check_crt method can allow an attacker to use a OCSP response for a different certificate (but from the same CA) to continue using a revoked certificate This can happen if the serial from the revoked certificate is a prefix of the other one, and the additional bytes happen to be equal on the ...