SB2013101502 - Slackware Linux update for gnutls



SB2013101502 - Slackware Linux update for gnutls

Published: October 15, 2013 Updated: May 6, 2017

Security Bulletin ID SB2013101502
Severity
Medium
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2011-4128)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to cause a denial of service (application crash) via a large SessionTicket.


2) Input validation error (CVE-ID: CVE-2012-1569)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.


3) Cryptographic issues (CVE-ID: CVE-2012-1573)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structure.


4) Cryptographic issues (CVE-ID: CVE-2013-1619)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The TLS implementation in GnuTLS before 2.12.23, 3.0.x before 3.0.28, and 3.1.x before 3.1.7 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.


5) Input validation error (CVE-ID: CVE-2013-2116)

The vulnerability allows remote attackers to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (buffer over-read and crash) via a crafted padding length.


Remediation

Install update from vendor's website.