FreeBSD : gnutls -- possible overflow/Denial of service vulnerabilities (aecee357-739e-11e1-a883-001cc0a36e12)

Medium Nessus Plugin ID 58423


The remote FreeBSD host is missing one or more security-related updates.


Mu Dynamics, Inc. reports :

The block cipher decryption logic in GnuTLS assumed that a record containing any data which was a multiple of the block size was valid for further decryption processing, leading to a heap corruption vulnerability.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 58423

File Name: freebsd_pkg_aecee357739e11e1a883001cc0a36e12.nasl

Version: $Revision: 1.4 $

Type: local

Published: 2012/03/22

Modified: 2013/06/22

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:gnutls, p-cpe:/a:freebsd:freebsd:gnutls-devel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2012/03/21

Vulnerability Publication Date: 2012/03/20

Reference Information

CVE: CVE-2012-1573