Your submission was sent successfully! Close

CVE-2006-7239

Published: 24 May 2010

The _gnutls_x509_oid2mac_algorithm function in lib/gnutls_algorithms.c in GnuTLS before 1.4.2 allows remote attackers to cause a denial of service (crash) via a crafted X.509 certificate that uses a hash algorithm that is not supported by GnuTLS, which triggers a NULL pointer dereference.

Priority

Medium

Status

Package Release Status
gnutls11
Launchpad, Ubuntu, Debian
dapper Not vulnerable
(code not present)
hardy Does not exist

jaunty Does not exist

karmic Does not exist

lucid Does not exist

upstream Needs triage

gnutls12
Launchpad, Ubuntu, Debian
dapper
Released (1.2.9-2ubuntu1.8)
hardy Does not exist

jaunty Does not exist

karmic Does not exist

lucid Does not exist

upstream Needs triage

gnutls13
Launchpad, Ubuntu, Debian
dapper Does not exist

hardy Not vulnerable

jaunty Does not exist

karmic Does not exist

lucid Does not exist

upstream Needs triage

gnutls26
Launchpad, Ubuntu, Debian
dapper Does not exist

hardy Does not exist

jaunty Not vulnerable

karmic Not vulnerable

lucid Not vulnerable

upstream Needs triage

Notes

AuthorNote
jdstrand
gnutls11 doesn't have the affected code:
_gnutls_x509_oid2mac_algorithm located in lib/x509/common.c which compares to
#defines from x509.h, not a pointer
Hardy (gnutls13) and higher already have the corrected code

References