lib/pk-libgcrypt.c in libgnutls in GnuTLS before 2.6.6 does not properly handle invalid DSA signatures, which allows remote attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a malformed DSA key that triggers a (1) free of an uninitialized pointer or (2) double free.
References
Configurations
History
09 Feb 2024, 03:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-824 | |
CPE | cpe:2.3:a:gnu:gnutls:1.2.6:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.11:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.9:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.3.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.2.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.0.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.1.21:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.1.16:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.6.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.1.6:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.6:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.1.20:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.0.3:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.0.21:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.3:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.2.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.0.18:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.1.3:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.19:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.8:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.6.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.12:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.10:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.0.24:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.0.16:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.0.19:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.3:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.18:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.9:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.3.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.4.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.10:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.0.25:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.5.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.1.13:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.14:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.4.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.3.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.6.3:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.3.3:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.8.1a1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.1.18:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.5.3:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.11:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.1.23:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.1.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.1.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.5.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.6.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.17:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.3.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.6.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.6.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.0.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.5.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.4.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.4.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.0.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.4.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.1.15:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.7:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.4.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.1.8:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.1.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.1.7:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.4.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.4.3:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.1.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.6.3:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.2.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.1.19:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.15:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.0.23:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.2.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.5.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.8:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.0.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.8:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.6.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.0.17:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.3:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.11:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.0.22:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.2.3:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.5.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.0.20:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.7:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.7:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.4.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.1.22:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.6:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.1.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.10:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.9:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.2.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.16:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.13:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.1.14:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.1.17:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.6.0:*:*:*:*:*:*:* |
|
References | (VUPEN) http://www.vupen.com/english/advisories/2009/1218 - Broken Link | |
References | (BID) http://www.securityfocus.com/bid/34783 - Broken Link, Third Party Advisory, VDB Entry | |
References | (MLIST) http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3515 - Broken Link, Patch | |
References | (SECTRACK) http://www.securitytracker.com/id?1022157 - Broken Link, Third Party Advisory, VDB Entry | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2009:116 - Broken Link | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/50260 - Not Applicable | |
References | (GENTOO) http://security.gentoo.org/glsa/glsa-200905-04.xml - Third Party Advisory | |
References | (MLIST) http://permalink.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3502 - Broken Link | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/50445 - Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/34842 - Broken Link, Vendor Advisory | |
References | (CONFIRM) http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3488 - Broken Link, Exploit | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/50257 - Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/35211 - Broken Link |
Information
Published : 2009-04-30 20:30
Updated : 2024-02-28 11:21
NVD link : CVE-2009-1415
Mitre link : CVE-2009-1415
CVE.ORG link : CVE-2009-1415
JSON object : View
Products Affected
gnu
- gnutls
CWE
CWE-824
Access of Uninitialized Pointer