Vulnerability Description
An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application's error handling path, where the gnutls_deinit function is called after detecting a handshake failure.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Gnutls | < 3.6.15 |
| Fedoraproject | Fedora | 32 |
| Opensuse | Leap | 15.1 |
| Canonical | Ubuntu Linux | 20.04 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00054.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00060.htmlMailing ListThird Party Advisory
- https://gitlab.com/gnutls/gnutls/-/issues/1071ExploitIssue TrackingThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://security.gentoo.org/glsa/202009-01Third Party Advisory
- https://security.netapp.com/advisory/ntap-20200911-0006/Third Party Advisory
- https://usn.ubuntu.com/4491-1/Third Party Advisory
- https://www.gnutls.org/security-new.html#GNUTLS-SA-2020-09-04Vendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00054.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00060.htmlMailing ListThird Party Advisory
- https://gitlab.com/gnutls/gnutls/-/issues/1071ExploitIssue TrackingThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://security.gentoo.org/glsa/202009-01Third Party Advisory
FAQ
What is CVE-2020-24659?
CVE-2020-24659 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid sec...
How severe is CVE-2020-24659?
CVE-2020-24659 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-24659?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Gnutls, Fedoraproject Fedora, Opensuse Leap, Canonical Ubuntu Linux.