SB2014061307 - Gentoo update for GnuTLS
Published: June 13, 2014 Updated: May 27, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Cryptographic issues (CVE-ID: CVE-2014-0092)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
lib/x509/verify.c in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 does not properly handle unspecified errors when verifying X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2014-1959)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
lib/x509/verify.c in GnuTLS before 3.1.21 and 3.2.x before 3.2.11 treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates.
3) Input validation error (CVE-ID: CVE-2014-3465)
The vulnerability allows remote attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (NULL pointer dereference) via a crafted X.509 certificate, related to a missing LDAP description for an OID when printing the DN.
4) Buffer overflow (CVE-ID: CVE-2014-3466)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.
Remediation
Install update from vendor's website.