vendor:
GnuTLS
by:
Shawn the R0ck
7,5
CVSS
HIGH
Remote Denial of Service (DoS)
400
CWE
Product Name: GnuTLS
Affected Version From: <= 3.0.13
Affected Version To: >= 3.0.14
Patch Exists: YES
Related CWE: CVE-2012-1663
CPE: a:gnutls:gnutls:3.0.13
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: GNU/Linux
2013
possible ways to exploit CVE-2012-1663( GNUTLS-3.0.13)
CVE-2013-1663 is a possible remote DOS attack issue. This issue has been fixed in >=GNUTLS-3.0.14. The attacker should try to construct a crafted certificate for triggering the below function fails: ret = gnutls_pubkey_import_x509(pcert->pubkey, crt, 0); if (ret < 0) { gnutls_pubkey_deinit(pcert->pubkey); /* pcert->pubkey should be NULL now */ ret = gnutls_assert_val(ret); goto cleanup; } Two crafted cert files (client.pem, client2.pem) seem to trigger the double free issue in the client's side.
Mitigation:
Upgrade to GNUTLS-3.0.14 or later version.