GnuTLS version 3.5.12 and earlier is vulnerable to a NULL pointer dereference while decoding a status response TLS extension with valid contents. This could lead to a crash of the GnuTLS server application.
References
Link | Resource |
---|---|
http://www.debian.org/security/2017/dsa-3884 | |
http://www.securityfocus.com/bid/99102 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2017:2292 | |
https://www.gnutls.org/security.html#GNUTLS-SA-2017-4 | Vendor Advisory |
http://www.debian.org/security/2017/dsa-3884 | |
http://www.securityfocus.com/bid/99102 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2017:2292 | |
https://www.gnutls.org/security.html#GNUTLS-SA-2017-4 | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2017/dsa-3884 - | |
References | () http://www.securityfocus.com/bid/99102 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2017:2292 - | |
References | () https://www.gnutls.org/security.html#GNUTLS-SA-2017-4 - Vendor Advisory |
Information
Published : 2017-06-16 19:29
Updated : 2024-11-21 03:32
NVD link : CVE-2017-7507
Mitre link : CVE-2017-7507
CVE.ORG link : CVE-2017-7507
JSON object : View
Products Affected
gnu
- gnutls
CWE
CWE-476
NULL Pointer Dereference