V
Scaner-VSvulnerability catalog · v4.2
CVE-2020-11501
DEB
High

GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error …

CVSS
7.4
High
EPSS
0.11
p93
Published
2020-01-01
Updated
2020-01-01
Description

GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 '\0' bytes instead of a random value, and thus contributes no randomness to a DTLS negotiation. This breaks the security guarantees of the DTLS protocol.

Tags · CWE
Pre-authCrypto
CWE-327
CWE-330
CAPEC-20
CAPEC-59
CAPEC-97
CAPEC-112
CAPEC-459
CAPEC-473
CAPEC-475
CAPEC-485
CAPEC-608
CAPEC-614
Affected products
Ubuntu_linuxDebian_linuxLeap
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Timeline
2020-01-01
Published
2020-01-01
Updated
CVSS 3.1 breakdown
Attack Vector
AV: N
Network (N)
Attack Complexity
AC: H
High (H)
Privileges Required
PR: N
None (N)
User Interaction
UI: N
None (N)
Scope
S: U
Unchanged (U)
Confidentiality Impact
C: H
High (H)
Integrity Impact
I: H
High (H)
Availability Impact
A: N
None (N)
Exploit indicators
EPSS
0.115 · p93
Known exploited (KEV)
No
MITRE ATT&CK
Inferred via CAPEC
└ via CAPEC-473 · CWE-327
└ via CAPEC-112 · CWE-330
└ via CAPEC-485 · CWE-330
└ via CAPEC-473 · CWE-327
Known exploits — Сканер-ВС
No Сканер-ВС checks registered for this vulnerability yet.
Affected software
ProductVendorStatus
gnutlsTracked
gnutlsTracked
gnutls-utilsTracked
gnutls28Tracked
gnutls28Tracked
gnutls28Tracked
gnutls28Tracked
gnutls28Tracked
gnutls28Tracked
gnutls28Tracked
gnutls30-devel-docTracked
libgnutls-develTracked
libgnutls-guileTracked
libgnutls-openssl-develTracked
libgnutls27-opensslTracked
libgnutls30Tracked
libgnutlsxx-develTracked
libgnutlsxx28Tracked
debian_linux*Tracked
fedora*Tracked
Source databases
DEB
CVE
RED
UBU
Related vulnerabilities