Menu
Serious flaw in GnuTLS library endangers SSL clients and systems

Serious flaw in GnuTLS library endangers SSL clients and systems

A vulnerability patched in the GnuTLS library can potentially be exploited from malicious servers to execute malware on computers

A serious vulnerability that could be exploited to crash TLS clients and potentially execute malicious code on underlying systems was patched in the popular GnuTLS cryptographic library.

The memory corruption vulnerability, which is tracked as CVE-2014-3466, was fixed in GnuTLS 3.3.3, GnuTLS 3.2.15 and GnuTLS 3.1.25 released Friday. Since then, the GnuTLS developers also released GnuTLS 3.3.4 to fix a non-security-related hardware acceleration bug.

GnuTLS is an open-source implementation of the SSL (Secure Sockets Layer), TLS (Transport Layer Security) and DTLS (Datagram Transport Layer Security) protocols which are used to encrypt communications on the Internet.

While not as popular as the OpenSSL library, GnuTLS is still widely used, being shipped by default with various Linux distributions including Red Hat, Ubuntu and Debian. Over 200 Linux software packages also depend on it for SSL/TLS support.

According to an entry on the Red Hat bug tracker, a malicious server could exploit the newly patched vulnerability by sending a very long session ID value during the SSL/TLS handshake. This can crash clients that use GnuTLS and can potentially allow attackers to execute arbitrary code on the system. Red Hat flagged the issue as being of high priority and severity.

Joonas Kuorilehto, a principal systems engineer at Codenomicon, was credited with reporting the vulnerability. Researchers from the same company also found the critical Heartbleed flaw in OpenSSL earlier this year prompting a global patching effort of SSL/TLS servers and clients.

In March, the GnuTLS developers fixed a different vulnerability that could have allowed attackers to craft rogue SSL certificates for websites of their choice that would have been accepted by the library as valid.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags patchesonline safetysecuritypatch managementencryptionRed HatExploits / vulnerabilitiesmalwareprivacyCodenomiconintrusion

Featured

Slideshows

Educating from the epicentre - Why distributors are the pulse checkers of the channel

Educating from the epicentre - Why distributors are the pulse checkers of the channel

​As the channel changes and industry voices deepen, the need for clarity and insight heightens. Market misconceptions talk of an “under pressure” distribution space, with competitors in that fateful “race for relevance” across New Zealand. Amidst the cliched assumptions however, distribution is once again showing its strength, as a force to be listened to, rather than questioned. Traditionally, the role was born out of a need for vendors and resellers to find one another, acting as a bridge between the testing lab and the marketplace. Yet despite new technologies and business approaches shaking the channel to its very core, distributors remain tied to the epicentre - providing the voice of reason amidst a seismic industry shift. In looking across both sides of the vendor and partner fences, the middle concept of the three-tier chain remains centrally placed to understand the metrics of two differing worlds, as the continual pulse checkers of the local channel. This exclusive Reseller News Roundtable, in association with Dicker Data and rhipe, examined the pivotal role of distribution in understanding the health of the channel, educating from the epicentre as the market transforms at a rapid rate.

Educating from the epicentre - Why distributors are the pulse checkers of the channel
Kiwi channel reunites as After Hours kicks off 2017

Kiwi channel reunites as After Hours kicks off 2017

After Hours made a welcome return to the channel social calendar last night, with a bumper crowd of distributors, vendors and resellers descending on The Jefferson in Auckland to kickstart 2017. Photos by Maria Stefina.

Kiwi channel reunites as After Hours kicks off 2017
Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Show Comments