GnuTLS.Certificate.Verification.verify_crt.Use.after.Free
Description
This indicates an attack attempt to exploit a Use After Free Vulnerability in GnuTLS GnuTLS.
Remote attackers could exploit the vulnerability in server programs utilizing the library by sending a malicious client certificate, and in client programs by sending a malicious server certificate to the vulnerable program as part of the TLS handshake. In a successful attack, the attacker can execute arbitrary code with the privileges of the application. An unsuccessful attack will result in a denial-of-service condition.
Affected Products
GnuTLS GnuTLS prior to 3.6.7
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.gnutls.org/security-new.html#GNUTLS-SA-2019-03-27
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2019-06-06 | 14.627 | Severity:critical:high |
2019-04-26 | 14.602 | Default_action:pass:drop |
2019-04-16 | 14.595 |