Vulnerability Name:

CVE-2010-0731 (CCN-57198)

Assigned:2010-03-25
Published:2010-03-25
Updated:2017-09-19
Summary:The gnutls_x509_crt_get_serial function in the GnuTLS library before 1.2.1, when running on big-endian, 64-bit platforms, calls the asn1_read_value with a pointer to the wrong data type and the wrong length value, which allows remote attackers to bypass the certificate revocation list (CRL) check and cause a stack-based buffer overflow via a crafted X.509 certificate, related to extraction of a serial number.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.0 Medium (REDHAT CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2010-0731

Source: SUSE
Type: UNKNOWN
SUSE-SR:2010:014

Source: CCN
Type: RHSA-2010-0167
Moderate: gnutls security update

Source: SECUNIA
Type: UNKNOWN
39127

Source: CONFIRM
Type: Exploit
http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/4230

Source: CCN
Type: GnuTLS Web page
The GNU Transport Layer Security Library

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2010:089

Source: CCN
Type: OSVDB ID: 63304
GnuTLS Library gnutls_x509_crt_get_serial Function Crafted X.509 Certificate CRL Check Bypass Overflow

Source: REDHAT
Type: UNKNOWN
RHSA-2010:0167

Source: BID
Type: UNKNOWN
38959

Source: CCN
Type: BID-38959
GnuTLS X.509 Certificate Serial Number Decoding Remote Security Vulnerability

Source: VUPEN
Type: Patch, Vendor Advisory
ADV-2010-0713

Source: VUPEN
Type: UNKNOWN
ADV-2010-1054

Source: CCN
Type: Red Hat Bugzilla Bug 573028
(CVE-2010-0731) CVE-2010-0731 gnutls: gnutls_x509_crt_get_serial incorrect serial decoding from ASN1 (BE64) [GNUTLS-SA-2010-1]

Source: CONFIRM
Type: Exploit
https://bugzilla.redhat.com/show_bug.cgi?id=573028

Source: XF
Type: UNKNOWN
gnutls-crl-bo(57198)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:9759

Vulnerable Configuration:Configuration 1:
  • cpe:/a:gnu:gnutls:1.0.16:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.0.17:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.0.18:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.0.19:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.0.20:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.0.21:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.0.22:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.0.23:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.0.24:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.0.25:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.1.13:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.1.14:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.1.15:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.1.16:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.1.17:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.1.18:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.1.19:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.1.20:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.1.21:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.1.22:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.1.23:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:*:*:*:*:*:*:*:* (Version <= 1.2.0)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:gnu:gnutls:1.0.16:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.0.17:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.0.18:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.0.19:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.0.20:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.0.21:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.0.22:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.0.23:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.0.24:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.0.25:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.1.14:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.1.15:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.1.16:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.1.17:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.1.18:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.1.19:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.1.20:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.1.21:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.1.22:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.1.23:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gnutls:1.1.13:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:9759
    V
    The gnutls_x509_crt_get_serial function in the GnuTLS library before 1.2.1, when running on big-endian, 64-bit platforms, calls the asn1_read_value with a pointer to the wrong data type and the wrong length value, which allows remote attackers to bypass the certificate revocation list (CRL) check and cause a stack-based buffer overflow via a crafted X.509 certificate, related to extraction of a serial number.
    2013-04-29
    oval:org.opensuse.security:def:20100731
    V
    CVE-2010-0731
    2012-08-30
    oval:com.redhat.rhsa:def:20100167
    P
    RHSA-2010:0167: gnutls security update (Moderate)
    2010-03-25
    BACK
    gnu gnutls 1.0.16
    gnu gnutls 1.0.17
    gnu gnutls 1.0.18
    gnu gnutls 1.0.19
    gnu gnutls 1.0.20
    gnu gnutls 1.0.21
    gnu gnutls 1.0.22
    gnu gnutls 1.0.23
    gnu gnutls 1.0.24
    gnu gnutls 1.0.25
    gnu gnutls 1.1.13
    gnu gnutls 1.1.14
    gnu gnutls 1.1.15
    gnu gnutls 1.1.16
    gnu gnutls 1.1.17
    gnu gnutls 1.1.18
    gnu gnutls 1.1.19
    gnu gnutls 1.1.20
    gnu gnutls 1.1.21
    gnu gnutls 1.1.22
    gnu gnutls 1.1.23
    gnu gnutls *
    gnu gnutls 1.0.16
    gnu gnutls 1.0.17
    gnu gnutls 1.0.18
    gnu gnutls 1.0.19
    gnu gnutls 1.0.20
    gnu gnutls 1.0.21
    gnu gnutls 1.0.22
    gnu gnutls 1.0.23
    gnu gnutls 1.0.24
    gnu gnutls 1.0.25
    gnu gnutls 1.1.14
    gnu gnutls 1.1.15
    gnu gnutls 1.1.16
    gnu gnutls 1.1.17
    gnu gnutls 1.1.18
    gnu gnutls 1.1.19
    gnu gnutls 1.1.20
    gnu gnutls 1.1.21
    gnu gnutls 1.1.22
    gnu gnutls 1.1.23
    gnu gnutls 1.2.0
    gnu gnutls 1.1.13
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0