Vulnerabilidad en gnutls_cipher.c en libgnutls en GnuTLS (CVE-2012-1573)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-310
Errores criptográficos
Fecha de publicación:
26/03/2012
Última modificación:
11/04/2025
Descripción
gnutls_cipher.c en libgnutls en GnuTLS antes de v2.12.17 y v3.x antes de v3.0.15 no maneja adecuadamente los datos cifrados con un cifrado de bloques, lo que permite provocar una denegación de servicio (corrupción de la pila de memoria y caída de la aplicación) a atacantes remotos a través de un registro hecho a mano, como se demuestra por una estructura GenericBlockCipher especificamente creada para este fin.
Impacto
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:* | 2.12.16 (incluyendo) | |
| cpe:2.3:a:gnu:gnutls:2.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:gnutls:2.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:gnutls:2.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:gnutls:2.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:gnutls:2.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:gnutls:2.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:gnutls:2.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:gnutls:2.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:gnutls:2.1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:gnutls:2.1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:gnutls:2.1.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:gnutls:2.1.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:gnutls:2.1.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:gnutls:2.1.8:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://archives.neohapsis.com/archives/bugtraq/2012-03/0099.html
- http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5910
- http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5912
- http://blog.mudynamics.com/2012/03/20/gnutls-and-libtasn1-vulns/
- http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba%3Dcommit%3Bh%3D422214868061370aeeb0ac9cd0f021a5c350a57d
- http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba%3Dcommit%3Bh%3Db495740f2ff66550ca9395b3fda3ea32c3acb185
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077071.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076496.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html
- http://osvdb.org/80259
- http://rhn.redhat.com/errata/RHSA-2012-0429.html
- http://rhn.redhat.com/errata/RHSA-2012-0488.html
- http://rhn.redhat.com/errata/RHSA-2012-0531.html
- http://secunia.com/advisories/48488
- http://secunia.com/advisories/48511
- http://secunia.com/advisories/48596
- http://secunia.com/advisories/48712
- http://secunia.com/advisories/57260
- http://www.debian.org/security/2012/dsa-2441
- http://www.gnu.org/software/gnutls/security.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A040
- http://www.openwall.com/lists/oss-security/2012/03/21/4
- http://www.openwall.com/lists/oss-security/2012/03/21/5
- http://www.securityfocus.com/bid/52667
- http://www.securitytracker.com/id?1026828=
- http://www.ubuntu.com/usn/USN-1418-1
- https://bugzilla.redhat.com/show_bug.cgi?id=805432
- http://archives.neohapsis.com/archives/bugtraq/2012-03/0099.html
- http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5910
- http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5912
- http://blog.mudynamics.com/2012/03/20/gnutls-and-libtasn1-vulns/
- http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba%3Dcommit%3Bh%3D422214868061370aeeb0ac9cd0f021a5c350a57d
- http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba%3Dcommit%3Bh%3Db495740f2ff66550ca9395b3fda3ea32c3acb185
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077071.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076496.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html
- http://osvdb.org/80259
- http://rhn.redhat.com/errata/RHSA-2012-0429.html
- http://rhn.redhat.com/errata/RHSA-2012-0488.html
- http://rhn.redhat.com/errata/RHSA-2012-0531.html
- http://secunia.com/advisories/48488
- http://secunia.com/advisories/48511
- http://secunia.com/advisories/48596
- http://secunia.com/advisories/48712
- http://secunia.com/advisories/57260
- http://www.debian.org/security/2012/dsa-2441
- http://www.gnu.org/software/gnutls/security.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A040
- http://www.openwall.com/lists/oss-security/2012/03/21/4
- http://www.openwall.com/lists/oss-security/2012/03/21/5
- http://www.securityfocus.com/bid/52667
- http://www.securitytracker.com/id?1026828=
- http://www.ubuntu.com/usn/USN-1418-1
- https://bugzilla.redhat.com/show_bug.cgi?id=805432



