Do your applications use this vulnerable package?
Test your applications
Overview
Affected versions of this package are vulnerable to Out-of-bounds Write. An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application's error handling path, where the gnutls_deinit function is called after detecting a handshake failure.
Remediation
There is no fixed version for gnutls28
.
References
CVSS Score
7.5
high severity
-
Attack VectorNetwork
-
Attack ComplexityLow
-
Privileges RequiredNone
-
User InteractionNone
-
ScopeUnchanged
-
ConfidentialityNone
-
IntegrityNone
-
AvailabilityHigh
- CVE
- CVE-2020-24659
- CWE
- CWE-476 CWE-787
- Snyk ID
- SNYK-DEBIAN10-GNUTLS28-609778
- Disclosed
- 04 Sep, 2020
- Published
- 05 Sep, 2020