|
|
Subscribe / Log in / New account

gnutls: code execution

Package(s):gnutls CVE #(s):CVE-2013-4466
Created:October 29, 2013 Updated:December 1, 2013
Description: From the Red Hat bugzilla:

Upstream GnuTLS versions 3.1.15 and 3.2.5 correct a buffer overflow in dane_query_tlsa() function used to parse DANE (DNS-based Authentication of Named Entities) DNS records. The function parses DNS server reply into dane_query_st / dane_query_t struct which can hold up to 4 entries, but the function failed to check this and allowed parsing more then 4 entries form the reply, resulting in buffer overflow.

An application using DANE protocol to verify certificates could crash or, possibly, execute arbitrary code when parsing a response from a malicious DNS server.

Alerts:
Mageia MGASA-2013-0354 gnutls 2013-11-30
Fedora FEDORA-2013-20052 gnutls 2013-10-29
Fedora FEDORA-2013-20628 gnutls 2013-11-18

to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds