GnuTLS.Proxy.Certificate.Info.Extension.Memory.Corruption
Description
This indicates an attack attempt against an Memory Corruption vulnerability in GnuTLS.
The vulnerability is due to insufficient input validation in the application when handling a crafted SSL packet. A remote attacker can exploit this to execute arbitrary code within the context of the application, via a crafted SSL request.
Affected Products
GnuTLS 3.3.x prior to 3.3.26
GnuTLS 3.5.x prior to 3.5.8
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
http://gnutls.org/security.html#GNUTLS-SA-2017-1
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2019-06-10 | 14.629 | Severity:high:critical |