Vulnerability Details : CVE-2011-4128
Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to cause a denial of service (application crash) via a large SessionTicket.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2011-4128
- cpe:2.3:a:gnu:gnutls:2.12.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.10:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.11:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.12:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.13:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.8:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.9:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-4128
0.35%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-4128
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2011-4128
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-4128
-
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077071.html
[SECURITY] Fedora 15 Update: gnutls-2.10.5-3.fc15
-
http://www.gnu.org/software/gnutls/security.html
GnuTLS
-
http://rhn.redhat.com/errata/RHSA-2012-0531.html
RHSA-2012:0531 - Security Advisory - Red Hat Customer Portal
-
http://rhn.redhat.com/errata/RHSA-2012-0429.html
RHSA-2012:0429 - Security Advisory - Red Hat Customer Portal
-
http://openwall.com/lists/oss-security/2011/11/09/4
oss-security - Re: CVE request: gnutls possible DoS (GNUTLS-SA-2011-2)
-
http://openwall.com/lists/oss-security/2011/11/09/2
oss-security - CVE request: gnutls possible DoS (GNUTLS-SA-2011-2)
-
http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=e82ef4545e9e98cbcb032f55d7c750b81e3a0450
Savannah Git Hosting - gnutls.git/commitdiff
-
http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=190cef6eed37d0e73a73c1e205eb31d45ab60a3c
Savannah Git Hosting - gnutls.git/commitdiff
-
http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5596
-
http://rhn.redhat.com/errata/RHSA-2012-0488.html
RHSA-2012:0488 - Security Advisory - Red Hat Customer Portal
-
http://www.mandriva.com/security/advisories?name=MDVSA-2012:045
mandriva.com
-
https://bugzilla.redhat.com/show_bug.cgi?id=752308
752308 – (CVE-2011-4128) CVE-2011-4128 gnutls: buffer overflow in gnutls_session_get_data() (GNUTLS-SA-2011-2)
-
http://www.ubuntu.com/usn/USN-1418-1
USN-1418-1: GnuTLS vulnerabilities | Ubuntu security notices
Jump to