| Vulnerability Name: | CVE-2017-5334 (CCN-120486) | ||||||||||||||||||||||||||||||||||||||||||||||||
| Assigned: | 2017-01-10 | ||||||||||||||||||||||||||||||||||||||||||||||||
| Published: | 2017-01-10 | ||||||||||||||||||||||||||||||||||||||||||||||||
| Updated: | 2018-10-30 | ||||||||||||||||||||||||||||||||||||||||||||||||
| Summary: | Double free vulnerability in the gnutls_x509_ext_import_proxy function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via crafted policy language information in an X.509 certificate with a Proxy Certificate Information extension. | ||||||||||||||||||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
4.6 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-415 CWE-416 | ||||||||||||||||||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2017-5334 Source: SUSE Type: Third Party Advisory openSUSE-SU-2017:0386 Source: CCN Type: IBM Security Bulletin T1025769 (PowerKVM) Vulnerabilities in GnuTLS affect PowerKVM Source: CCN Type: IBM Security Bulletin N1022302 (Server Firmware, HMC and SDMC) Vulnerabilities in GnuTLS affect Power Hardware Management Console Source: CCN Type: IBM Security Bulletin 2012330 (Security Access Manager) IBM Security Access Manager Appliance is affected by GnuTLS vulnerabilities Source: MLIST Type: Mailing List, Patch, Third Party Advisory [oss-security] 20170110 CVE request: two advisories for GnuTLS GNUTLS-SA-2017-1, GNUTLS-SA-2017-2, fixed in 3.3.26, 3.5.8 Source: MLIST Type: Mailing List, Patch, Third Party Advisory [oss-security] 20170110 Re: CVE request: two advisories for GnuTLS GNUTLS-SA-2017-1, GNUTLS-SA-2017-2, fixed in 3.3.26, 3.5.8 Source: BID Type: Third Party Advisory, VDB Entry 95370 Source: CCN Type: BID-95370 GnuTLS CVE-2017-5334 Security Bypass Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry 1037576 Source: REDHAT Type: UNKNOWN RHSA-2017:2292 Source: XF Type: UNKNOWN gnutls-cve20175334-code-exec(120486) Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://gitlab.com/gnutls/gnutls/commit/c5aaa488a3d6df712dc8dff23a049133cab5ec1b Source: CCN Type: GNUTLS-SA-2017-1 Memory corruption Source: CONFIRM Type: Vendor Advisory https://gnutls.org/security.html#GNUTLS-SA-2017-1 Source: GENTOO Type: Patch, Third Party Advisory, Vendor Advisory GLSA-201702-04 Source: CCN Type: WhiteSource Vulnerability Database CVE-2017-5334 | ||||||||||||||||||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||||||||||||||||||