GnuTLS.Proxy.Certificate.Info.Extension.Memory.Corruption

description-logoDescription

This indicates an attack attempt against an Memory Corruption vulnerability in GnuTLS.
The vulnerability is due to insufficient input validation in the application when handling a crafted SSL packet. A remote attacker can exploit this to execute arbitrary code within the context of the application, via a crafted SSL request.

affected-products-logoAffected Products

GnuTLS 3.3.x prior to 3.3.26
GnuTLS 3.5.x prior to 3.5.8

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
http://gnutls.org/security.html#GNUTLS-SA-2017-1

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2019-06-10 14.629 Severity:high:critical