Threat Encyclopedia



This indicates an attack attempt to exploit a Use After Free Vulnerability in GnuTLS GnuTLS.
Remote attackers could exploit the vulnerability in server programs utilizing the library by sending a malicious client certificate, and in client programs by sending a malicious server certificate to the vulnerable program as part of the TLS handshake. In a successful attack, the attacker can execute arbitrary code with the privileges of the application. An unsuccessful attack will result in a denial-of-service condition.

affected-products-logoAffected Products

GnuTLS GnuTLS prior to 3.6.7


System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.

CVE References