vendor:
GnuTLS
by:
SecurityFocus
7.5
CVSS
HIGH
Remote Code-Execution, Denial-of-Service, Signature-Generation, Signature-Verification
20
CWE
Product Name: GnuTLS
Affected Version From: Prior to GnuTLS 2.6.6
Affected Version To: GnuTLS 2.6.6
Patch Exists: YES
Related CWE: CVE-2009-1416
CPE: 2.6.2006
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=38815, https://www.infosecmatter.com/nessus-plugin-library/?id=38885, https://www.infosecmatter.com/nessus-plugin-library/?id=40661, https://www.infosecmatter.com/nessus-plugin-library/?id=75629, https://www.infosecmatter.com/nessus-plugin-library/?id=47037, https://www.infosecmatter.com/nessus-plugin-library/?id=47038, https://www.infosecmatter.com/nessus-plugin-library/?id=50046
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, Windows, Mac
2009
GnuTLS Multiple Remote Vulnerabilities
GnuTLS is prone to multiple remote vulnerabilities, including a remote code-execution vulnerability, a denial-of-service vulnerability, a signature-generation vulnerability, and a signature-verification vulnerability. An attacker can exploit these issues to potentially execute arbitrary code, trigger denial-of-service conditions, carry out attacks against data signed with weak signatures, and cause clients to accept expired or invalid certificates from servers.
Mitigation:
Upgrade to GnuTLS version 2.6.6 or later.