Vulnerability Details : CVE-2015-3308
Double free vulnerability in lib/x509/x509_ext.c in GnuTLS before 3.3.14 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted CRL distribution point.
Vulnerability category: Memory CorruptionDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2015-3308
Probability of exploitation activity in the next 30 days: 3.30%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 90 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2015-3308
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2015-3308
-
http://www.securityfocus.com/bid/74188
GnuTLS 'x509_ext.c' Use After Free Denial of Service Vulnerability
-
https://security.gentoo.org/glsa/201506-03
GnuTLS: Multiple vulnerabilities (GLSA 201506-03) — Gentoo security
-
https://gitlab.com/gnutls/gnutls/commit/d6972be33264ecc49a86cd0958209cd7363af1e9
eliminated double-free in the parsing of dist points (d6972be3) · Commits · gnutls / GnuTLS · GitLab
-
http://www.ubuntu.com/usn/USN-2727-1
USN-2727-1: GnuTLS vulnerabilities | Ubuntu security notices
-
http://www.openwall.com/lists/oss-security/2015/04/16/6
oss-security - Re: double-free in gnutls (CRL distribution points parsing)
-
https://gitlab.com/gnutls/gnutls/commit/053ae65403216acdb0a4e78b25ad66ee9f444f02
Better fix for the double free in dist point parsing (053ae654) · Commits · gnutls / GnuTLS · GitLab
-
http://www.securitytracker.com/id/1033774
GnuTLS Double-Free Memory Error in CRL Distribution Point Parsing Lets Remote Users Cause the Target Service to Crash - SecurityTracker
-
http://www.openwall.com/lists/oss-security/2015/04/15/6
oss-security - double-free in gnutls (CRL distribution points parsing)
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155101.html
[SECURITY] Fedora 22 Update: gnutls-3.3.14-1.fc22
-
http://www.gnutls.org/security.html#GNUTLS-SA-2015-4
GnuTLS
Products affected by CVE-2015-3308
- cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*