CVE-2017-5334
Severity CVSS v4.0:
Pending analysis
Type:
CWE-415
Double Free
Publication date:
24/03/2017
Last modified:
20/04/2025
Description
Double free vulnerability in the gnutls_x509_ext_import_proxy function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via crafted policy language information in an X.509 certificate with a Proxy Certificate Information extension.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:* | 3.3.25 (including) | |
cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
- http://www.openwall.com/lists/oss-security/2017/01/10/7
- http://www.openwall.com/lists/oss-security/2017/01/11/4
- http://www.securityfocus.com/bid/95370
- http://www.securitytracker.com/id/1037576
- https://access.redhat.com/errata/RHSA-2017:2292
- https://gitlab.com/gnutls/gnutls/commit/c5aaa488a3d6df712dc8dff23a049133cab5ec1b
- https://gnutls.org/security.html#GNUTLS-SA-2017-1
- https://security.gentoo.org/glsa/201702-04
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
- http://www.openwall.com/lists/oss-security/2017/01/10/7
- http://www.openwall.com/lists/oss-security/2017/01/11/4
- http://www.securityfocus.com/bid/95370
- http://www.securitytracker.com/id/1037576
- https://access.redhat.com/errata/RHSA-2017:2292
- https://gitlab.com/gnutls/gnutls/commit/c5aaa488a3d6df712dc8dff23a049133cab5ec1b
- https://gnutls.org/security.html#GNUTLS-SA-2017-1
- https://security.gentoo.org/glsa/201702-04