TLS 1.3 Client Vulnerability in GnuTLS from GnuTLS Project
CVE-2020-24659

7.5HIGH

Key Information:

Vendor
Gnu
Status
Vendor
CVE Published:
4 September 2020

Summary

A vulnerability exists in GnuTLS affecting versions prior to 3.6.15, where a server can induce a NULL pointer dereference in a TLS 1.3 client. This occurs when a no_renegotiation alert is sent with unexpected timing, followed by an invalid second handshake. The issue manifests during the application's error management sequence, specifically when the gnutls_deinit function is invoked due to a handshake failure. This flaw can potentially lead to application crashes, impacting the reliability and stability of services utilizing GnuTLS.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.