We all are lucky having a freely floating source code. The bug  in
GNUTLS  was patched  .  This is from patch file:

-       if (len < session_id_len) {
+       if (len < session_id_len || session_id_len > TLS_MAX_SESSION_ID_SIZE) {
                gnutls_assert();
                return GNUTLS_E_UNSUPPORTED_VERSION_PACKET;
        }

by  Nikos Mavrogiannopoulos of Redhat. The issue was in gnutls_handshake.c .[1]

The flaw was found in the way GnuTLS parsed session IDs from
ServerHello messages of the TLS/SSL handshake. A malicious server
could use this flaw to send an excessively long session ID value,
which would trigger a buffer overflow in a connecting TLS/SSL client
application using GnuTLS, causing the client application to crash or,
possibly, execute arbitrary code.[2]

On 2014-05-30 they released GNUTLS version with bug fixes. [3]

[1] https://bugzilla.redhat.com/attachment.cgi?id=899870
[2] https://bugzilla.redhat.com/show_bug.cgi?id=1101932
[3] http://gnutls.org/index.html


-- 
Registered Linux user #545296

_______________________________________________
Indian Libre User Group Cochin Mailing List
http://www.ilug-cochin.org/mailing-list/
http://ilug-cochin.org/mailman/listinfo/mailinglist_ilug-cochin.org
#[email protected]

Reply via email to