CVE-2010-0731

The gnutls_x509_crt_get_serial function in the GnuTLS library before 1.2.1, when running on big-endian, 64-bit platforms, calls the asn1_read_value with a pointer to the wrong data type and the wrong length value, which allows remote attackers to bypass the certificate revocation list (CRL) check and cause a stack-based buffer overflow via a crafted X.509 certificate, related to extraction of a serial number.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.0.16:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.0.17:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.0.18:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.0.19:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.0.20:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.0.21:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.0.22:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.0.23:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.0.24:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.0.25:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.1.13:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.1.14:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.1.15:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.1.16:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.1.17:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.1.18:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.1.19:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.1.20:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.1.21:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.1.22:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.1.23:*:*:*:*:*:*:*

History

21 Nov 2024, 01:12

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html -
References () http://secunia.com/advisories/39127 - () http://secunia.com/advisories/39127 -
References () http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/4230 - Exploit () http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/4230 - Exploit
References () http://www.mandriva.com/security/advisories?name=MDVSA-2010:089 - () http://www.mandriva.com/security/advisories?name=MDVSA-2010:089 -
References () http://www.redhat.com/support/errata/RHSA-2010-0167.html - () http://www.redhat.com/support/errata/RHSA-2010-0167.html -
References () http://www.securityfocus.com/bid/38959 - () http://www.securityfocus.com/bid/38959 -
References () http://www.vupen.com/english/advisories/2010/0713 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2010/0713 - Patch, Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1054 - () http://www.vupen.com/english/advisories/2010/1054 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=573028 - Exploit () https://bugzilla.redhat.com/show_bug.cgi?id=573028 - Exploit
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9759 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9759 -

Information

Published : 2010-03-26 18:30

Updated : 2024-11-21 01:12


NVD link : CVE-2010-0731

Mitre link : CVE-2010-0731

CVE.ORG link : CVE-2010-0731


JSON object : View

Products Affected

gnu

  • gnutls
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer