Threat Encyclopedia

GnuTLS.Certificate.Verification.verify_crt.Use.after.Free

description-logoDescription

This indicates an attack attempt to exploit a Use After Free Vulnerability in GnuTLS GnuTLS.
Remote attackers could exploit the vulnerability in server programs utilizing the library by sending a malicious client certificate, and in client programs by sending a malicious server certificate to the vulnerable program as part of the TLS handshake. In a successful attack, the attacker can execute arbitrary code with the privileges of the application. An unsuccessful attack will result in a denial-of-service condition.

affected-products-logoAffected Products

GnuTLS GnuTLS prior to 3.6.7

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://www.gnutls.org/security-new.html#GNUTLS-SA-2019-03-27

CVE References

CVE-2019-3829