Debian DSA-3191-1 : gnutls26 - security update

high Nessus Plugin ID 81835

Synopsis

The remote Debian host is missing a security-related update.

Description

Multiple vulnerabilities have been discovered in GnuTLS, a library implementing the TLS and SSL protocols. The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2015-0282 GnuTLS does not verify the RSA PKCS #1 signature algorithm to match the signature algorithm in the certificate, leading to a potential downgrade to a disallowed algorithm without detecting it.

- CVE-2015-0294 It was reported that GnuTLS does not check whether the two signature algorithms match on certificate import.

Solution

Upgrade the gnutls26 packages.

For the stable distribution (wheezy), these problems have been fixed in version 2.12.20-8+deb7u3.

See Also

https://security-tracker.debian.org/tracker/CVE-2015-0282

https://security-tracker.debian.org/tracker/CVE-2015-0294

https://packages.debian.org/source/wheezy/gnutls26

https://www.debian.org/security/2015/dsa-3191

Plugin Details

Severity: High

ID: 81835

File Name: debian_DSA-3191.nasl

Version: 1.10

Type: local

Agent: unix

Published: 3/17/2015

Updated: 1/11/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:gnutls26, cpe:/o:debian:debian_linux:7.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 3/15/2015

Vulnerability Publication Date: 3/24/2015

Reference Information

CVE: CVE-2015-0282, CVE-2015-0294

BID: 73119

DSA: 3191