CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
Lifecycle Timeline
4Tags
Description
A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.
Analysis
A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.
Technical Context
A buffer overflow occurs when data written to a buffer exceeds its allocated size, potentially overwriting adjacent memory and corrupting program state. This vulnerability is classified as Heap-based Buffer Overflow (CWE-122).
Affected Products
Affected products: Gnu Gnutls -, Redhat Openshift Container Platform 4.0, Redhat Enterprise Linux 6.0
Remediation
Use memory-safe languages or bounds-checked functions. Enable ASLR, DEP/NX, and stack canaries. Apply vendor patches promptly.
Priority Score
Vendor Status
Ubuntu
Priority: Medium| Release | Status | Version |
|---|---|---|
| upstream | released | 3.8.9-3 |
| jammy | released | 3.7.3-4ubuntu1.7 |
| noble | released | 3.8.3-1.1ubuntu3.4 |
| plucky | released | 3.8.9-2ubuntu3.1 |
| oracular | ignored | end of life, was needs-triage |
| bionic | released | 3.5.18-1ubuntu1.6+esm2 |
| focal | released | 3.6.13-2ubuntu1.12+esm1 |
| xenial | released | 3.4.10-4ubuntu1.9+esm2 |
| questing | released | 3.8.9-3ubuntu1 |
Debian
| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| bullseye | fixed | 3.7.1-5+deb11u8 | - |
| bullseye (security) | fixed | 3.7.1-5+deb11u9 | - |
| bookworm | fixed | 3.7.9-2+deb12u5 | - |
| bookworm (security) | fixed | 3.7.9-2+deb12u6 | - |
| trixie (security), trixie | fixed | 3.8.9-3+deb13u2 | - |
| forky, sid | fixed | 3.8.12-3 | - |
| (unstable) | fixed | 3.8.9-3 | - |
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-20990