Vulnerability Details : CVE-2012-1573
gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structure.
Vulnerability category: Memory CorruptionDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2012-1573
Probability of exploitation activity in the next 30 days: 95.93%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-1573
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2012-1573
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-1573
-
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077071.html
[SECURITY] Fedora 15 Update: gnutls-2.10.5-3.fc15
-
http://www.gnu.org/software/gnutls/security.html
GnuTLSVendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2012:040
mandriva.com
-
http://secunia.com/advisories/48511
Sign in
-
http://www.openwall.com/lists/oss-security/2012/03/21/4
oss-security - CVE request: GnuTLS TLS record handling issue / MU-201202-01
-
http://www.debian.org/security/2012/dsa-2441
Debian -- Security Information -- DSA-2441-1 gnutls26
-
http://rhn.redhat.com/errata/RHSA-2012-0531.html
RHSA-2012:0531 - Security Advisory - Red Hat Customer Portal
-
http://rhn.redhat.com/errata/RHSA-2012-0429.html
RHSA-2012:0429 - Security Advisory - Red Hat Customer Portal
-
http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commit;h=b495740f2ff66550ca9395b3fda3ea32c3acb185
Savannah Git Hosting - gnutls.git/commitPatch
-
http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076496.html
[SECURITY] Fedora 16 Update: gnutls-2.12.14-2.fc16
-
http://www.securitytracker.com/id?1026828
GnuTLS Error in ciphertext_to_compressed() Lets Remote Users Deny Service - SecurityTracker
-
http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commit;h=422214868061370aeeb0ac9cd0f021a5c350a57d
Savannah Git Hosting - gnutls.git/commitPatch
- http://archives.neohapsis.com/archives/bugtraq/2012-03/0099.html
-
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html
[security-announce] SUSE-SU-2014:0320-1: critical: Security update for g
-
http://www.openwall.com/lists/oss-security/2012/03/21/5
oss-security - Re: CVE request: GnuTLS TLS record handling issue / MU-201202-01
-
http://www.securityfocus.com/bid/52667
GnuTLS TLS Record Handling Heap Memory Corruption Vulnerability
-
http://rhn.redhat.com/errata/RHSA-2012-0488.html
RHSA-2012:0488 - Security Advisory - Red Hat Customer Portal
-
https://bugzilla.redhat.com/show_bug.cgi?id=805432
805432 – (CVE-2012-1573) CVE-2012-1573 gnutls: TLS record handling issue (GNUTLS-SA-2012-2, MU-201202-01)
-
http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5912
-
http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5910
article.gmane.org | 523: Origin is unreachable
-
http://blog.mudynamics.com/2012/03/20/gnutls-and-libtasn1-vulns/
Exploit
-
http://www.ubuntu.com/usn/USN-1418-1
USN-1418-1: GnuTLS vulnerabilities | Ubuntu security notices
Products affected by CVE-2012-1573
- cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.10:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.11:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.12:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.13:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.8:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.9:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.10.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.14:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.10.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.15:*:*:*:*:*:*:*