[manjaro-security] [arch-security] [ASA-201609-25] gnutls: certificate verification bypass
Levente Polyak
anthraxx at archlinux.org
Mon Sep 26 22:17:00 CEST 2016
Arch Linux Security Advisory ASA-201609-25
==========================================
Severity: Medium
Date : 2016-09-26
CVE-ID : CVE-2016-7444
Package : gnutls
Type : certificate verification bypass
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
Summary
=======
The package gnutls before version 3.4.15-1 is vulnerable to certificate
verification bypass.
Resolution
==========
Upgrade to 3.4.15-1.
# pacman -Syu "gnutls>=3.4.15-1"
The problem has been fixed upstream in version 3.4.15.
Workaround
==========
None.
Description
===========
Incorrect length validation on gnutls's gnutls_ocsp_resp_check_crt
method can allow an attacker to use a OCSP response for a different
certificate (but from the same CA) to continue using a revoked
certificate. This can happen if the serial from the revoked certificate
is a prefix of the other one, and the additional bytes happen to be
equal on the system doing the verification.
Impact
======
A remote attacker is able to bypass certificate verification and
continue using a revoked certificate under certain circumstances.
References
==========
https://lists.gnupg.org/pipermail/gnutls-devel/2016-September/008146.html
https://gitlab.com/gnutls/gnutls/commit/964632f37dfdfb914ebc5e49db4fa29af35b1de9
https://access.redhat.com/security/cve/CVE-2016-7444
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <http://lists.manjaro.org/pipermail/manjaro-security/attachments/20160926/e0d90bb1/attachment.pgp>
More information about the manjaro-security
mailing list