GnuTLS version 3.5.12 and earlier is vulnerable to a NULL pointer dereference while decoding a status response TLS extension with valid contents. This could lead to a crash of the GnuTLS server application.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/99102 | vdb entry third party advisory |
https://access.redhat.com/errata/RHSA-2017:2292 | vendor advisory |
https://www.gnutls.org/security.html#GNUTLS-SA-2017-4 | vendor advisory |
http://www.debian.org/security/2017/dsa-3884 | vendor advisory |