Vulnerabilities > CVE-2014-0092 - Cryptographic Issues vulnerability in GNU Gnutls

047910
CVSS 5.8 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
NONE
network
gnu
CWE-310
nessus

Summary

lib/x509/verify.c in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 does not properly handle unspecified errors when verifying X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.

Vulnerable Configurations

Part Description Count
Application
Gnu
243

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Nessus

  • NASL familySolaris Local Security Checks
    NASL idSOLARIS11_GNUTLS_20140915.NASL
    descriptionThe remote Solaris system is missing necessary patches to address security updates : - lib/x509/verify.c in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 does not properly handle unspecified errors when verifying X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers via a crafted certificate. (CVE-2014-0092)
    last seen2020-06-01
    modified2020-06-02
    plugin id80631
    published2015-01-19
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/80631
    titleOracle Solaris Third-Party Patch Update : gnutls (cve_2014_0092_cryptographic_issues)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-0288.NASL
    descriptionUpdated gnutls packages that fix one security issue are now available for Red Hat Enterprise Linux 4 Extended Life Cycle Support, Red Hat Enterprise Linux 5.3, 5.6 and 6.2 Long Life, and Red Hat Enterprise Linux 5.9, 6.3 and 6.4 Extended Update Support. The Red Hat Security Response Team has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The GnuTLS library provides support for cryptographic algorithms and for protocols such as Transport Layer Security (TLS). It was discovered that GnuTLS did not correctly handle certain errors that could occur during the verification of an X.509 certificate, causing it to incorrectly report a successful verification. An attacker could use this flaw to create a specially crafted certificate that could be accepted by GnuTLS as valid for a site chosen by the attacker. (CVE-2014-0092) This issue was discovered by Nikos Mavrogiannopoulos of the Red Hat Security Technologies Team. Users of GnuTLS are advised to upgrade to these updated packages, which correct this issue. For the update to take effect, all applications linked to the GnuTLS library must be restarted.
    last seen2020-06-01
    modified2020-06-02
    plugin id79001
    published2014-11-08
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79001
    titleRHEL 4 / 5 / 6 : gnutls (RHSA-2014:0288)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20140303_GNUTLS_ON_SL5_X.NASL
    descriptionIt was discovered that GnuTLS did not correctly handle certain errors that could occur during the verification of an X.509 certificate, causing it to incorrectly report a successful verification. An attacker could use this flaw to create a specially crafted certificate that could be accepted by GnuTLS as valid for a site chosen by the attacker. (CVE-2014-0092) A flaw was found in the way GnuTLS handled version 1 X.509 certificates. An attacker able to obtain a version 1 certificate from a trusted certificate authority could use this flaw to issue certificates for other sites that would be accepted by GnuTLS as valid. (CVE-2009-5138) For the update to take effect, all applications linked to the GnuTLS library must be restarted.
    last seen2020-03-18
    modified2014-03-04
    plugin id72795
    published2014-03-04
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72795
    titleScientific Linux Security Update : gnutls on SL5.x i386/x86_64 (20140303)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-2869.NASL
    descriptionNikos Mavrogiannopoulos of Red Hat discovered an X.509 certificate verification issue in GnuTLS, an SSL/TLS library. A certificate validation could be reported sucessfully even in cases were an error would prevent all verification steps to be performed. An attacker doing a man-in-the-middle of a TLS connection could use this vulnerability to present a carefully crafted certificate that would be accepted by GnuTLS as valid even if not signed by one of the trusted authorities.
    last seen2020-03-17
    modified2014-03-04
    plugin id72782
    published2014-03-04
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72782
    titleDebian DSA-2869-1 : gnutls26 - incorrect certificate verification
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2014-301.NASL
    descriptionIt was discovered that GnuTLS did not correctly handle certain errors that could occur during the verification of an X.509 certificate, causing it to incorrectly report a successful verification. An attacker could use this flaw to create a specially crafted certificate that could be accepted by GnuTLS as valid for a site chosen by the attacker. (CVE-2014-0092)
    last seen2020-06-01
    modified2020-06-02
    plugin id72949
    published2014-03-12
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/72949
    titleAmazon Linux AMI : gnutls (ALAS-2014-301)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2014-183.NASL
    descriptionThe gnutls library was updated to fix SSL certificate validation. Remote man-in-the-middle attackers were able to make the verification believe that a SSL certificate is valid even though it was not.
    last seen2020-06-05
    modified2014-06-13
    plugin id75276
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75276
    titleopenSUSE Security Update : gnutls (openSUSE-SU-2014:0328-1)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-3363.NASL
    descriptionfixes CVE-2014-0092 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-03-07
    plugin id72868
    published2014-03-07
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72868
    titleFedora 19 : gnutls-3.1.20-4.fc19 (2014-3363)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_F645AA90A3E811E3A4223C970E169BC2.NASL
    descriptionGnuTLS project reports : A vulnerability was discovered that affects the certificate verification functions of all gnutls versions. A specially crafted certificate could bypass certificate validation checks. The vulnerability was discovered during an audit of GnuTLS for Red Hat. Suman Jana reported a vulnerability that affects the certificate verification functions of gnutls 2.11.5 and later versions. A version 1 intermediate certificate will be considered as a CA certificate by default (something that deviates from the documented behavior).
    last seen2020-06-01
    modified2020-06-02
    plugin id72808
    published2014-03-05
    reporterThis script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72808
    titleFreeBSD : gnutls -- multiple certificate verification issues (f645aa90-a3e8-11e3-a422-3c970e169bc2)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2014-0247.NASL
    descriptionUpdated gnutls packages that fix two security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The GnuTLS library provides support for cryptographic algorithms and for protocols such as Transport Layer Security (TLS). It was discovered that GnuTLS did not correctly handle certain errors that could occur during the verification of an X.509 certificate, causing it to incorrectly report a successful verification. An attacker could use this flaw to create a specially crafted certificate that could be accepted by GnuTLS as valid for a site chosen by the attacker. (CVE-2014-0092) A flaw was found in the way GnuTLS handled version 1 X.509 certificates. An attacker able to obtain a version 1 certificate from a trusted certificate authority could use this flaw to issue certificates for other sites that would be accepted by GnuTLS as valid. (CVE-2009-5138) The CVE-2014-0092 issue was discovered by Nikos Mavrogiannopoulos of the Red Hat Security Technologies Team. Users of GnuTLS are advised to upgrade to these updated packages, which correct these issues. For the update to take effect, all applications linked to the GnuTLS library must be restarted.
    last seen2020-06-01
    modified2020-06-02
    plugin id72804
    published2014-03-05
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72804
    titleCentOS 5 : gnutls (CESA-2014:0247)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-3454.NASL
    descriptionVersion 3.1.22 (released 2014-03-03) - libgnutls: Corrected certificate verification issue (GNUTLS-SA-2014-2) - libgnutls: Corrected issue in gnutls_pcert_list_import_x509_raw when provided with invalid data. Reported by Dmitriy Anisimkov. - libgnutls: Corrected timeout issue in subsequent to the first DTLS handshakes. - libgnutls: Removed unconditional not-trusted message in gnutls_certificate_verification_status_print() when used with OpenPGP certificates. Reported by Michel Briand. - libgnutls: All ciphersuites that were available in TLS1.0 or later are now made available in SSL3.0 or later to prevent any incompatibilities with servers that negotiate them in SSL 3.0. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-03-17
    plugin id73036
    published2014-03-17
    reporterThis script is Copyright (C) 2014-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/73036
    titleFedora 20 : mingw-gnutls-3.1.22-1.fc20 (2014-3454)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-0246.NASL
    descriptionUpdated gnutls packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The GnuTLS library provides support for cryptographic algorithms and for protocols such as Transport Layer Security (TLS). It was discovered that GnuTLS did not correctly handle certain errors that could occur during the verification of an X.509 certificate, causing it to incorrectly report a successful verification. An attacker could use this flaw to create a specially crafted certificate that could be accepted by GnuTLS as valid for a site chosen by the attacker. (CVE-2014-0092) The CVE-2014-0092 issue was discovered by Nikos Mavrogiannopoulos of the Red Hat Security Technologies Team. Users of GnuTLS are advised to upgrade to these updated packages, which correct this issue. For the update to take effect, all applications linked to the GnuTLS library must be restarted.
    last seen2020-06-01
    modified2020-06-02
    plugin id72793
    published2014-03-04
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72793
    titleRHEL 6 : gnutls (RHSA-2014:0246)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-0339.NASL
    descriptionAn updated rhev-hypervisor6 package that fixes multiple security issues is now available. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes everything necessary to run and manage virtual machines: a subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent. Note: Red Hat Enterprise Virtualization Hypervisor is only available for the Intel 64 and AMD64 architectures with virtualization extensions. It was discovered that GnuTLS did not correctly handle certain errors that could occur during the verification of an X.509 certificate, causing it to incorrectly report a successful verification. An attacker could use this flaw to create a specially crafted certificate that could be accepted by GnuTLS as valid for a site chosen by the attacker. (CVE-2014-0092) A flaw was found in the way the get_rx_bufs() function in the vhost_net implementation in the Linux kernel handled error conditions reported by the vhost_get_vq_desc() function. A privileged guest user could use this flaw to crash the host. (CVE-2014-0055) A heap-based buffer overflow flaw was found in the Linux kernel
    last seen2020-06-01
    modified2020-06-02
    plugin id79003
    published2014-11-08
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79003
    titleRHEL 6 : rhev-hypervisor6 (RHSA-2014:0339)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2014-181.NASL
    descriptionThe gnutls library was updated to fixed x509 certificate validation problems, where man-in-the-middle attackers could hijack SSL connections. This update also reenables Elliptic Curve support to meet current day cryptographic requirements.
    last seen2020-06-05
    modified2014-06-13
    plugin id75274
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75274
    titleopenSUSE Security Update : gnutls (openSUSE-SU-2014:0325-1)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2014-0247.NASL
    descriptionFrom Red Hat Security Advisory 2014:0247 : Updated gnutls packages that fix two security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The GnuTLS library provides support for cryptographic algorithms and for protocols such as Transport Layer Security (TLS). It was discovered that GnuTLS did not correctly handle certain errors that could occur during the verification of an X.509 certificate, causing it to incorrectly report a successful verification. An attacker could use this flaw to create a specially crafted certificate that could be accepted by GnuTLS as valid for a site chosen by the attacker. (CVE-2014-0092) A flaw was found in the way GnuTLS handled version 1 X.509 certificates. An attacker able to obtain a version 1 certificate from a trusted certificate authority could use this flaw to issue certificates for other sites that would be accepted by GnuTLS as valid. (CVE-2009-5138) The CVE-2014-0092 issue was discovered by Nikos Mavrogiannopoulos of the Red Hat Security Technologies Team. Users of GnuTLS are advised to upgrade to these updated packages, which correct these issues. For the update to take effect, all applications linked to the GnuTLS library must be restarted.
    last seen2020-06-01
    modified2020-06-02
    plugin id72792
    published2014-03-04
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72792
    titleOracle Linux 5 : gnutls (ELSA-2014-0247)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-3413.NASL
    descriptionAdded fix for CVE-2014-0092 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-03-07
    plugin id72869
    published2014-03-07
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72869
    titleFedora 20 : gnutls-3.1.20-4.fc20 (2014-3413)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-0247.NASL
    descriptionUpdated gnutls packages that fix two security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The GnuTLS library provides support for cryptographic algorithms and for protocols such as Transport Layer Security (TLS). It was discovered that GnuTLS did not correctly handle certain errors that could occur during the verification of an X.509 certificate, causing it to incorrectly report a successful verification. An attacker could use this flaw to create a specially crafted certificate that could be accepted by GnuTLS as valid for a site chosen by the attacker. (CVE-2014-0092) A flaw was found in the way GnuTLS handled version 1 X.509 certificates. An attacker able to obtain a version 1 certificate from a trusted certificate authority could use this flaw to issue certificates for other sites that would be accepted by GnuTLS as valid. (CVE-2009-5138) The CVE-2014-0092 issue was discovered by Nikos Mavrogiannopoulos of the Red Hat Security Technologies Team. Users of GnuTLS are advised to upgrade to these updated packages, which correct these issues. For the update to take effect, all applications linked to the GnuTLS library must be restarted.
    last seen2020-06-01
    modified2020-06-02
    plugin id72794
    published2014-03-04
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72794
    titleRHEL 5 : gnutls (RHSA-2014:0247)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201406-09.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201406-09 (GnuTLS: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in GnuTLS. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could utilize multiple vectors to spoof arbitrary SSL servers via a crafted certificate, execute arbitrary code or cause a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id76061
    published2014-06-16
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/76061
    titleGLSA-201406-09 : GnuTLS: Multiple vulnerabilities
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2014-0321-1.NASL
    descriptionThe GnuTLS library received a critical security fix and other updates : - CVE-2014-0092: The X.509 certificate verification had incorrect error handling, which could lead to broken certificates marked as being valid. - CVE-2009-5138: A verification problem in handling V1 certificates could also lead to V1 certificates incorrectly being handled. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-05-20
    plugin id83612
    published2015-05-20
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/83612
    titleSUSE SLES10 Security Update : gnutls (SUSE-SU-2014:0321-1)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2015-072.NASL
    descriptionUpdated gnutls packages fix security vulnerabilities : Suman Jana reported a vulnerability that affects the certificate verification functions of gnutls 3.1.x and gnutls 3.2.x. A version 1 intermediate certificate will be considered as a CA certificate by default (something that deviates from the documented behavior) (CVE-2014-1959). It was discovered that GnuTLS did not correctly handle certain errors that could occur during the verification of an X.509 certificate, causing it to incorrectly report a successful verification. An attacker could use this flaw to create a specially crafted certificate that could be accepted by GnuTLS as valid for a site chosen by the attacker (CVE-2014-0092). A NULL pointer dereference flaw was discovered in GnuTLS
    last seen2020-06-01
    modified2020-06-02
    plugin id82325
    published2015-03-30
    reporterThis script is Copyright (C) 2015-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/82325
    titleMandriva Linux Security Advisory : gnutls (MDVSA-2015:072)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20140303_GNUTLS_ON_SL6_X.NASL
    descriptionIt was discovered that GnuTLS did not correctly handle certain errors that could occur during the verification of an X.509 certificate, causing it to incorrectly report a successful verification. An attacker could use this flaw to create a specially crafted certificate that could be accepted by GnuTLS as valid for a site chosen by the attacker. (CVE-2014-0092) For the update to take effect, all applications linked to the GnuTLS library must be restarted.
    last seen2020-03-18
    modified2014-03-04
    plugin id72796
    published2014-03-04
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72796
    titleScientific Linux Security Update : gnutls on SL6.x i386/x86_64 (20140303)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2014-0246.NASL
    descriptionFrom Red Hat Security Advisory 2014:0246 : Updated gnutls packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The GnuTLS library provides support for cryptographic algorithms and for protocols such as Transport Layer Security (TLS). It was discovered that GnuTLS did not correctly handle certain errors that could occur during the verification of an X.509 certificate, causing it to incorrectly report a successful verification. An attacker could use this flaw to create a specially crafted certificate that could be accepted by GnuTLS as valid for a site chosen by the attacker. (CVE-2014-0092) The CVE-2014-0092 issue was discovered by Nikos Mavrogiannopoulos of the Red Hat Security Technologies Team. Users of GnuTLS are advised to upgrade to these updated packages, which correct this issue. For the update to take effect, all applications linked to the GnuTLS library must be restarted.
    last seen2020-06-01
    modified2020-06-02
    plugin id72791
    published2014-03-04
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72791
    titleOracle Linux 6 : gnutls (ELSA-2014-0246)
  • NASL familySlackware Local Security Checks
    NASL idSLACKWARE_SSA_2014-062-01.NASL
    descriptionNew gnutls packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix a security issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id72781
    published2014-03-04
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72781
    titleSlackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : gnutls (SSA:2014-062-01)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2014-048.NASL
    descriptionUpdated gnutls packages fix security vulnerability : It was discovered that GnuTLS did not correctly handle certain errors that could occur during the verification of an X.509 certificate, causing it to incorrectly report a successful verification. An attacker could use this flaw to create a specially crafted certificate that could be accepted by GnuTLS as valid for a site chosen by the attacker (CVE-2014-0092).
    last seen2020-06-01
    modified2020-06-02
    plugin id72919
    published2014-03-11
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72919
    titleMandriva Linux Security Advisory : gnutls (MDVSA-2014:048)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2014-0246.NASL
    descriptionUpdated gnutls packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The GnuTLS library provides support for cryptographic algorithms and for protocols such as Transport Layer Security (TLS). It was discovered that GnuTLS did not correctly handle certain errors that could occur during the verification of an X.509 certificate, causing it to incorrectly report a successful verification. An attacker could use this flaw to create a specially crafted certificate that could be accepted by GnuTLS as valid for a site chosen by the attacker. (CVE-2014-0092) The CVE-2014-0092 issue was discovered by Nikos Mavrogiannopoulos of the Red Hat Security Technologies Team. Users of GnuTLS are advised to upgrade to these updated packages, which correct this issue. For the update to take effect, all applications linked to the GnuTLS library must be restarted.
    last seen2020-06-01
    modified2020-06-02
    plugin id72803
    published2014-03-05
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72803
    titleCentOS 6 : gnutls (CESA-2014:0246)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-3493.NASL
    descriptionVersion 3.1.22 (released 2014-03-03) - libgnutls: Corrected certificate verification issue (GNUTLS-SA-2014-2) - libgnutls: Corrected issue in gnutls_pcert_list_import_x509_raw when provided with invalid data. Reported by Dmitriy Anisimkov. - libgnutls: Corrected timeout issue in subsequent to the first DTLS handshakes. - libgnutls: Removed unconditional not-trusted message in gnutls_certificate_verification_status_print() when used with OpenPGP certificates. Reported by Michel Briand. - libgnutls: All ciphersuites that were available in TLS1.0 or later are now made available in SSL3.0 or later to prevent any incompatibilities with servers that negotiate them in SSL 3.0. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-03-17
    plugin id73038
    published2014-03-17
    reporterThis script is Copyright (C) 2014-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/73038
    titleFedora 19 : mingw-gnutls-3.1.22-1.fc19 (2014-3493)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-2127-1.NASL
    descriptionNikos Mavrogiannopoulos discovered that GnuTLS incorrectly handled certificate verification functions. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could be exploited with specially crafted certificates to view sensitive information. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-18
    modified2014-03-05
    plugin id72812
    published2014-03-05
    reporterUbuntu Security Notice (C) 2014-2020 Canonical, Inc. / NASL script (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72812
    titleUbuntu 10.04 LTS / 12.04 LTS / 12.10 / 13.10 : gnutls26 vulnerability (USN-2127-1)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_GNUTLS-140227.NASL
    descriptionThe GnuTLS library received a critical security fix and other updates : - The X.509 certificate verification had incorrect error handling, which could lead to broken certificates marked as being valid. (CVE-2014-0092) - A verification problem in handling V1 certificates could also lead to V1 certificates incorrectly being handled. Additionally a memory leak in PSK authentication has been fixed. (bnc#835760). (CVE-2009-5138)
    last seen2020-06-05
    modified2014-03-04
    plugin id72797
    published2014-03-04
    reporterThis script is Copyright (C) 2014-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/72797
    titleSuSE 11.3 Security Update : gnutls (SAT Patch Number 8949)
  • NASL familyOracleVM Local Security Checks
    NASL idORACLEVM_OVMSA-2015-0101.NASL
    descriptionThe remote OracleVM system is missing necessary patches to address critical security updates : - fix CVE-2015-0282 (#1198159) - fix CVE-2015-0294 (#1198159) - Corrected value initialization in mpi printing (#1129241) - Check for expiry information in the CA certificates (#1159778) - fix issue with integer padding in certificates and keys (#1036385) - fix session ID length check (#1102025) - fix CVE-2014-0092 (#1069891) - fix CVE-2013-2116 - fix DoS regression in (CVE-2013-1619) upstream patch (#966754) - fix CVE-2013-1619 - fix TLS-CBC timing attack (#908238)
    last seen2020-06-01
    modified2020-06-02
    plugin id85142
    published2015-07-31
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85142
    titleOracleVM 3.3 : gnutls (OVMSA-2015-0101)

Redhat

advisories
  • bugzilla
    id1069865
    titleCVE-2014-0092 gnutls: incorrect error handling in certificate verification (GNUTLS-SA-2014-2)
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 6 is installed
        ovaloval:com.redhat.rhba:tst:20111656003
      • OR
        • AND
          • commentgnutls-utils is earlier than 0:2.8.5-13.el6_5
            ovaloval:com.redhat.rhsa:tst:20140246001
          • commentgnutls-utils is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20120429004
        • AND
          • commentgnutls is earlier than 0:2.8.5-13.el6_5
            ovaloval:com.redhat.rhsa:tst:20140246003
          • commentgnutls is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20120429002
        • AND
          • commentgnutls-guile is earlier than 0:2.8.5-13.el6_5
            ovaloval:com.redhat.rhsa:tst:20140246005
          • commentgnutls-guile is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20120429006
        • AND
          • commentgnutls-devel is earlier than 0:2.8.5-13.el6_5
            ovaloval:com.redhat.rhsa:tst:20140246007
          • commentgnutls-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20120429008
    rhsa
    idRHSA-2014:0246
    released2014-03-03
    severityImportant
    titleRHSA-2014:0246: gnutls security update (Important)
  • bugzilla
    id1069865
    titleCVE-2014-0092 gnutls: incorrect error handling in certificate verification (GNUTLS-SA-2014-2)
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • commentgnutls-utils is earlier than 0:1.4.1-14.el5_10
            ovaloval:com.redhat.rhsa:tst:20140247001
          • commentgnutls-utils is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20120319004
        • AND
          • commentgnutls is earlier than 0:1.4.1-14.el5_10
            ovaloval:com.redhat.rhsa:tst:20140247003
          • commentgnutls is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20120319006
        • AND
          • commentgnutls-devel is earlier than 0:1.4.1-14.el5_10
            ovaloval:com.redhat.rhsa:tst:20140247005
          • commentgnutls-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20120319002
    rhsa
    idRHSA-2014:0247
    released2014-03-03
    severityImportant
    titleRHSA-2014:0247: gnutls security update (Important)
  • rhsa
    idRHSA-2014:0288
  • rhsa
    idRHSA-2014:0339
rpms
  • gnutls-0:2.8.5-13.el6_5
  • gnutls-debuginfo-0:2.8.5-13.el6_5
  • gnutls-devel-0:2.8.5-13.el6_5
  • gnutls-guile-0:2.8.5-13.el6_5
  • gnutls-utils-0:2.8.5-13.el6_5
  • gnutls-0:1.4.1-14.el5_10
  • gnutls-debuginfo-0:1.4.1-14.el5_10
  • gnutls-devel-0:1.4.1-14.el5_10
  • gnutls-utils-0:1.4.1-14.el5_10
  • gnutls-0:1.0.20-5.el4
  • gnutls-0:1.4.1-10.el5_9.3
  • gnutls-0:1.4.1-3.el5_3.6
  • gnutls-0:1.4.1-7.el5_6.1
  • gnutls-0:2.8.5-10.el6_4.3
  • gnutls-0:2.8.5-4.el6_2.3
  • gnutls-0:2.8.5-7.el6_3.2
  • gnutls-debuginfo-0:1.0.20-5.el4
  • gnutls-debuginfo-0:1.4.1-10.el5_9.3
  • gnutls-debuginfo-0:1.4.1-3.el5_3.6
  • gnutls-debuginfo-0:1.4.1-7.el5_6.1
  • gnutls-debuginfo-0:2.8.5-10.el6_4.3
  • gnutls-debuginfo-0:2.8.5-4.el6_2.3
  • gnutls-debuginfo-0:2.8.5-7.el6_3.2
  • gnutls-devel-0:1.0.20-5.el4
  • gnutls-devel-0:1.4.1-10.el5_9.3
  • gnutls-devel-0:1.4.1-3.el5_3.6
  • gnutls-devel-0:1.4.1-7.el5_6.1
  • gnutls-devel-0:2.8.5-10.el6_4.3
  • gnutls-devel-0:2.8.5-4.el6_2.3
  • gnutls-devel-0:2.8.5-7.el6_3.2
  • gnutls-guile-0:2.8.5-10.el6_4.3
  • gnutls-guile-0:2.8.5-4.el6_2.3
  • gnutls-guile-0:2.8.5-7.el6_3.2
  • gnutls-utils-0:1.4.1-10.el5_9.3
  • gnutls-utils-0:1.4.1-3.el5_3.6
  • gnutls-utils-0:1.4.1-7.el5_6.1
  • gnutls-utils-0:2.8.5-10.el6_4.3
  • gnutls-utils-0:2.8.5-4.el6_2.3
  • gnutls-utils-0:2.8.5-7.el6_3.2
  • rhev-hypervisor6-0:6.5-20140324.0.el6ev

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 65919 CVE(CAN) ID: CVE-2014-0092 GnuTLS是用于实现TLS加密协议的函数库。 GnuTLS 3.1.22, 3.2.12之前版本在实现上存在安全漏洞,X.509证书验证的错误处理不正确,可将故障证书标记为有效证书,这可使远程用户利用此漏洞绕过证书验证。 0 GnuTLS GnuTLS 3.2.12 GnuTLS GnuTLS 3.1.22 厂商补丁: GnuTLS ------ 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://gnutls.org http://gnutls.org/security.html#GNUTLS-SA-2014-2
idSSV:61641
last seen2017-11-19
modified2014-03-05
published2014-03-05
reporterRoot
titleGnuTLS证书验证安全限制绕过漏洞