GnuTLS.Certificate.Verification.verify_crt.Use.after.Free

description-logoDescription

This indicates an attack attempt to exploit a Use After Free Vulnerability in GnuTLS GnuTLS.
Remote attackers could exploit the vulnerability in server programs utilizing the library by sending a malicious client certificate, and in client programs by sending a malicious server certificate to the vulnerable program as part of the TLS handshake. In a successful attack, the attacker can execute arbitrary code with the privileges of the application. An unsuccessful attack will result in a denial-of-service condition.

affected-products-logoAffected Products

GnuTLS GnuTLS prior to 3.6.7

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://www.gnutls.org/security-new.html#GNUTLS-SA-2019-03-27

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2019-06-06 14.627 Severity:critical:high
2019-04-26 14.602 Default_action:pass:drop
2019-04-16 14.595