Vulnerability Name: | CVE-2009-1415 (CCN-50257) |
Assigned: | 2009-04-30 |
Published: | 2009-04-30 |
Updated: | 2017-08-17 |
Summary: | lib/pk-libgcrypt.c in libgnutls in GnuTLS before 2.6.6 does not properly handle invalid DSA signatures, which allows remote attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a malformed DSA key that triggers a (1) free of an uninitialized pointer or (2) double free.
|
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P) 3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Access Complexity (AC): Authentication (Au): | Impact Metrics: | Confidentiality (C): Integrity (I): Availibility (A): | 7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Access Complexity (AC): Athentication (Au):
| Impact Metrics: | Confidentiality (C): Integrity (I): Availibility (A): |
|
Vulnerability Type: | CWE-255
|
Vulnerability Consequences: | Gain Access |
References: | Source: CCN Type: gnutls-devel Mailing List, 2009-04-30 10:36:31 GMT Double free and free of invalid pointer on certain errors [GNUTLS-SA-2009-1] [CVE-2009-1415]
Source: MLIST Type: Patch [gnutls-devel] 20090430 Double free and free of invalid pointer on certain errors [GNUTLS-SA-2009-1] [CVE-2009-1415]
Source: MITRE Type: CNA CVE-2009-1415
Source: MLIST Type: UNKNOWN [gnutls-devel] 20090423 Re: some crashes on using DSA keys
Source: CCN Type: SA34842 GnuTLS Multiple Vulnerabilities
Source: SECUNIA Type: Vendor Advisory 34842
Source: SECUNIA Type: UNKNOWN 35211
Source: GENTOO Type: UNKNOWN GLSA-200905-04
Source: CCN Type: SECTRACK ID: 1022157 GnuTLS Bug in Validating DSA Signatures Lets Remote Users Deny Service
Source: CONFIRM Type: Exploit http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3488
Source: CCN Type: GLSA-200905-04 GnuTLS: Multiple vulnerabilities
Source: CCN Type: GNU TLS Library Project Web site The GNU Transport Layer Security Library
Source: MANDRIVA Type: UNKNOWN MDVSA-2009:116
Source: BID Type: UNKNOWN 34783
Source: CCN Type: BID-34783 GnuTLS Prior to 2.6.6 Multiple Remote Vulnerabilities
Source: SECTRACK Type: UNKNOWN 1022157
Source: VUPEN Type: UNKNOWN ADV-2009-1218
Source: XF Type: UNKNOWN gnutls-dsa-code-execution(50257)
Source: XF Type: UNKNOWN gnutls-dsa-code-execution(50257)
Source: XF Type: UNKNOWN gnutls-dsa-dos(50260)
Source: XF Type: UNKNOWN gnutls-libgnutls-dos(50445)
|
Vulnerable Configuration: | Configuration 1: cpe:/a:gnu:gnutls:1.0.16:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.0.17:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.0.18:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.0.19:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.0.20:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.0.21:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.0.22:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.0.23:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.0.24:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.0.25:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.1.13:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.1.14:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.1.15:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.1.16:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.1.17:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.1.18:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.1.19:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.1.20:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.1.21:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.1.22:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.1.23:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.2.0:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.2.1:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.2.2:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.2.3:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.2.4:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.2.5:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.2.6:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.2.7:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.2.8:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.2.8.1a1:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.2.9:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.2.10:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.2.11:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.3.0:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.3.1:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.3.2:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.3.3:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.3.4:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.3.5:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.4.0:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.4.1:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.4.2:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.4.3:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.4.4:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.4.5:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.5.0:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.5.1:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.5.2:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.5.3:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.5.4:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.5.5:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.6.0:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.6.1:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.6.2:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.6.3:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.7.0:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.7.1:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.7.2:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.7.3:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.7.4:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.7.5:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.7.6:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.7.7:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.7.8:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.7.9:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.7.10:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.7.11:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.7.12:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.7.13:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.7.14:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.7.15:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.7.16:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.7.17:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.7.18:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:1.7.19:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.0.0:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.0.1:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.0.2:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.0.3:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.0.4:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.1.0:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.1.1:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.1.2:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.1.3:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.1.4:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.1.5:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.1.6:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.1.7:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.1.8:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.2.0:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.2.1:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.2.2:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.2.3:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.2.4:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.2.5:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.3.0:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.3.1:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.3.2:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.3.3:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.3.4:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.3.5:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.3.6:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.3.7:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.3.8:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.3.9:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.3.10:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.3.11:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.4.0:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.4.1:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.4.2:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.6.0:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.6.1:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.6.2:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.6.3:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.6.4:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:*:*:*:*:*:*:*:* (Version <= 2.6.5) Configuration CCN 1: cpe:/a:gnu:gnutls:2.6.0:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.6.1:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.6.2:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.6.3:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.6.4:*:*:*:*:*:*:*OR cpe:/a:gnu:gnutls:2.6.5:*:*:*:*:*:*:*AND cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:x86_64:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*
Denotes that component is vulnerable |
Vulnerability Name: | CVE-2009-1415 (CCN-50445) |
Assigned: | 2009-04-30 |
Published: | 2009-04-30 |
Updated: | 2017-08-17 |
Summary: | lib/pk-libgcrypt.c in libgnutls in GnuTLS before 2.6.6 does not properly handle invalid DSA signatures, which allows remote attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a malformed DSA key that triggers a (1) free of an uninitialized pointer or (2) double free.
|
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Low |
|
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P) 3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Access Complexity (AC): Authentication (Au): | Impact Metrics: | Confidentiality (C): Integrity (I): Availibility (A): | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P) 3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Access Complexity (AC): Athentication (Au):
| Impact Metrics: | Confidentiality (C): Integrity (I): Availibility (A): |
|
Vulnerability Type: | CWE-255
|
Vulnerability Consequences: | Denial of Service |
References: | Source: CCN Type: gnutls-devel Mailing List, 2009-04-30 10:36:31 GMTT Double free and free of invalid pointer on certain errors [GNUTLS-SA-2009-1]
Source: MITRE Type: CNA CVE-2009-1415
Source: CCN Type: SA34842 GnuTLS Multiple Vulnerabilities
Source: CCN Type: SECTRACK ID: 1022157 GnuTLS Bug in Validating DSA Signatures Lets Remote Users Deny Service
Source: CCN Type: GLSA-200905-04 GnuTLS: Multiple vulnerabilities
Source: CCN Type: GNU TLS Library Project Web site The GNU Transport Layer Security Library
Source: CCN Type: BID-34783 GnuTLS Prior to 2.6.6 Multiple Remote Vulnerabilities
Source: XF Type: UNKNOWN gnutls-libgnutls-dos(50445)
|
BACK |