Critical bug in GnuTLS crypto library could allow malicious code execution
Posted on 04 June 2014.
Another critical bug in an open source SSL/TLS (and DTLS) cryptographic library has been discovered and patched last week. The affected library is GnuTLS, and is used in a number of Linux-based operating systems as well as several hundreds Linux software packages.

"A flaw was found in the way GnuTLS parsed session ids from Server Hello packets of the TLS/SSL handshake. A malicious server could use this flaw to send an excessively long session id value and trigger a buffer overflow in a connecting TLS/SSL client using GnuTLS, causing it to crash or, possibly, execute arbitrary code," Tomas Hoger explained in a post on the Red Hat Bug Tracker.

"The flaw is in read_server_hello() / _gnutls_read_server_hello(), where session_id_len is checked to not exceed incoming packet size, but not checked to ensure it does not exceed maximum session id length."

The flaw (CVE-2014-3466) was discovered by Codenomicon researcher Joonas Kuorilehto. A patch has been created by GNU TLS developer Nikos Mavrogiannopoulos, and the GnuTLS organization has pushed out new GnuTLS versions (3.1.25, 3.2.15, 3.3.4) to which users are advised to update as soon as possible.

For a technical analysis of the flaw check out Radare's official blog, where it is demonstrated that the vulnerability can, indeed, be exploited in real-world attacks.

The issue has apparently already been addressed in Red Hat Enterprise Linux 5 and 6, Fedora 20. The Debian project has also solved the issue and recommends users to upgrade their gnutls26 packages.









Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //