Intrusion Prevention

GnuTLS.Proxy.Certificate.Info.Extension.Memory.Corruption

Description

This indicates an attack attempt against an Memory Corruption vulnerability in GnuTLS.
The vulnerability is due to insufficient input validation in the application when handling a crafted SSL packet. A remote attacker can exploit this to execute arbitrary code within the context of the application, via a crafted SSL request.

Affected Products

GnuTLS 3.3.x prior to 3.3.26
GnuTLS 3.5.x prior to 3.5.8

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor.
http://gnutls.org/security.html#GNUTLS-SA-2017-1

CVE References

CVE-2017-5334