Executive Summary
Summary | |
---|---|
Title | gnutls26 security update |
Informations | |||
---|---|---|---|
Name | DSA-3191 | First vendor Publication | 2015-03-15 |
Vendor | Debian | Last vendor Modification | 2015-03-15 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple vulnerabilities have been discovered in GnuTLS, a library implementing the TLS and SSL protocols. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2015-0282 GnuTLS does not verify the RSA PKCS #1 signature algorithm to match the signature algorithm in the certificate, leading to a potential downgrade to a disallowed algorithm without detecting it. CVE-2015-0294 It was reported that GnuTLS does not check whether the two signature algorithms match on certificate import. For the stable distribution (wheezy), these problems have been fixed in version 2.12.20-8+deb7u3. We recommend that you upgrade your gnutls26 packages. |
Original Source
Url : http://www.debian.org/security/2015/dsa-3191 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-310 | Cryptographic Issues |
50 % | CWE-295 | Certificate Issues |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-09-29 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL17327.nasl - Type : ACT_GATHER_INFO |
2015-08-05 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2015-575.nasl - Type : ACT_GATHER_INFO |
2015-08-04 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20150722_gnutls_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2015-07-31 | Name : The remote OracleVM host is missing a security update. File : oraclevm_OVMSA-2015-0101.nasl - Type : ACT_GATHER_INFO |
2015-07-30 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2015-1457.nasl - Type : ACT_GATHER_INFO |
2015-07-28 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2015-1457.nasl - Type : ACT_GATHER_INFO |
2015-07-23 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-1457.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-0735-1.nasl - Type : ACT_GATHER_INFO |
2015-04-08 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_gnutls-150325.nasl - Type : ACT_GATHER_INFO |
2015-03-31 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2015-269.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-180.nasl - Type : ACT_GATHER_INFO |
2015-03-24 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2540-1.nasl - Type : ACT_GATHER_INFO |
2015-03-17 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3191.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2015-03-26 00:34:26 |
|
2015-03-24 21:30:46 |
|
2015-03-18 13:27:40 |
|
2015-03-16 00:23:31 |
|