lib/x509/verify.c in GnuTLS before 3.1.21 and 3.2.x before 3.2.11 treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/oss-sec/2014/q1/344 - | |
References | () http://seclists.org/oss-sec/2014/q1/345 - | |
References | () http://www.debian.org/security/2014/dsa-2866 - | |
References | () http://www.gnutls.org/security.html - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/65559 - | |
References | () http://www.ubuntu.com/usn/USN-2121-1 - | |
References | () https://www.gitorious.org/gnutls/gnutls/commit/b1abfe3d182d68539900092eb42fc62cf1bb7e7c - Exploit, Patch |
Information
Published : 2014-03-07 00:10
Updated : 2024-11-21 02:05
NVD link : CVE-2014-1959
Mitre link : CVE-2014-1959
CVE.ORG link : CVE-2014-1959
JSON object : View
Products Affected
gnu
- gnutls
CWE
CWE-264
Permissions, Privileges, and Access Controls