OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00039.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00056.html | Mailing List Third Party Advisory |
https://bugs.gentoo.org/721570 | Exploit Third Party Advisory |
https://gitlab.com/openconnect/openconnect/-/merge_requests/108 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/05/msg00015.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/25MFX4AZE7RDCUWOL4ZOE73YBOPUMQDX/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYSXLXAPXD2T73T6JMHI5G2WP7KHAGMN/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEVTIH5UFX35CC7MVSYBGRM3D66ACFD5/ | |
https://security.gentoo.org/glsa/202006-15 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2020-05-12 18:15
Updated : 2024-02-04 21:00
NVD link : CVE-2020-12823
Mitre link : CVE-2020-12823
CVE.ORG link : CVE-2020-12823
JSON object : View
Products Affected
infradead
- openconnect
fedoraproject
- fedora
debian
- debian_linux
opensuse
- leap
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')