The gnutls_x509_crt_get_serial function in the GnuTLS library before 1.2.1, when running on big-endian, 64-bit platforms, calls the asn1_read_value with a pointer to the wrong data type and the wrong length value, which allows remote attackers to bypass the certificate revocation list (CRL) check and cause a stack-based buffer overflow via a crafted X.509 certificate, related to extraction of a serial number.
2010-03-26T18:30:00.437
2025-04-11T00:51:21.963
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | gnu | gnutls | ≤ 1.2.0 | Yes |
Application | gnu | gnutls | 1.0.16 | Yes |
Application | gnu | gnutls | 1.0.17 | Yes |
Application | gnu | gnutls | 1.0.18 | Yes |
Application | gnu | gnutls | 1.0.19 | Yes |
Application | gnu | gnutls | 1.0.20 | Yes |
Application | gnu | gnutls | 1.0.21 | Yes |
Application | gnu | gnutls | 1.0.22 | Yes |
Application | gnu | gnutls | 1.0.23 | Yes |
Application | gnu | gnutls | 1.0.24 | Yes |
Application | gnu | gnutls | 1.0.25 | Yes |
Application | gnu | gnutls | 1.1.13 | Yes |
Application | gnu | gnutls | 1.1.14 | Yes |
Application | gnu | gnutls | 1.1.15 | Yes |
Application | gnu | gnutls | 1.1.16 | Yes |
Application | gnu | gnutls | 1.1.17 | Yes |
Application | gnu | gnutls | 1.1.18 | Yes |
Application | gnu | gnutls | 1.1.19 | Yes |
Application | gnu | gnutls | 1.1.20 | Yes |
Application | gnu | gnutls | 1.1.21 | Yes |
Application | gnu | gnutls | 1.1.22 | Yes |
Application | gnu | gnutls | 1.1.23 | Yes |