CVE-2016-7444
Published: 27 September 2016
The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
gnutls26 Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Does not exist
|
|
cosmic |
Does not exist
|
|
disco |
Does not exist
|
|
precise |
Not vulnerable
|
|
trusty |
Not vulnerable
|
|
upstream |
Not vulnerable
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
|
gnutls28 Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(3.5.3-4ubuntu1)
|
bionic |
Not vulnerable
(3.5.3-4ubuntu1)
|
|
cosmic |
Not vulnerable
(3.5.3-4ubuntu1)
|
|
disco |
Not vulnerable
(3.5.3-4ubuntu1)
|
|
precise |
Does not exist
(precise was not-affected [code not present])
|
|
trusty |
Does not exist
(trusty was needed)
|
|
upstream |
Released
(3.5.3-4)
|
|
xenial |
Released
(3.4.10-4ubuntu1.2)
|
|
yakkety |
Not vulnerable
(3.5.3-4ubuntu1)
|
|
zesty |
Not vulnerable
(3.5.3-4ubuntu1)
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7444
- https://gnutls.org/security.html#GNUTLS-SA-2016-3
- http://lists.gnutls.org/pipermail/gnutls-devel/2016-September/008146.html
- http://www.openwall.com/lists/oss-security/2016/09/18/3
- https://ubuntu.com/security/notices/USN-3183-1
- NVD
- Launchpad
- Debian