Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2008-4989

Published: 12 November 2008

The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS before 2.6.1 trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate, which allows man-in-the-middle attackers to insert a spoofed certificate for any Distinguished Name (DN).

Priority

Medium

Cvss 3 Severity Score

5.9

Score breakdown

Status

Package Release Status
gnutls11
Launchpad, Ubuntu, Debian
dapper Ignored
(end of life)
gutsy Does not exist

hardy Does not exist

intrepid Does not exist

jaunty Does not exist

karmic Does not exist

upstream Needs triage

Patches:
vendor: https://rhn.redhat.com/errata/RHSA-2008-0982.html
gnutls12
Launchpad, Ubuntu, Debian
dapper
Released (1.2.9-2ubuntu1.3)
gutsy Does not exist

hardy Does not exist

intrepid Does not exist

jaunty Does not exist

karmic Does not exist

upstream Needs triage

gnutls13
Launchpad, Ubuntu, Debian
dapper Does not exist

gutsy
Released (1.6.3-1ubuntu0.2)
hardy
Released (2.0.4-1ubuntu2.2)
intrepid Does not exist

jaunty Does not exist

karmic Does not exist

upstream Needs triage

gnutls26
Launchpad, Ubuntu, Debian
dapper Does not exist

gutsy Does not exist

hardy Does not exist

intrepid
Released (2.4.1-1ubuntu0.1)
jaunty Not vulnerable
(2.4.2-3)
karmic Not vulnerable
(2.4.2-3)
upstream
Released (2.4.2-3)

Severity score breakdown

Parameter Value
Base score 5.9
Attack vector Network
Attack complexity High
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact High
Availability impact None
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N