Lucene search

K
f5F5F5:K15623
HistoryOct 17, 2014 - 12:00 a.m.

K15623 : GnuTLS vulnerability CVE-2009-5138

2014-10-1700:00:00
my.f5.com
26

6.3 Medium

AI Score

Confidence

Low

0.007 Low

EPSS

Percentile

79.5%

Security Advisory Description

GnuTLS before 2.7.6, when the GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT flag is not enabled, treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates, a different vulnerability than CVE-2014-1959. (CVE-2009-5138)

Impact

A remote attacker may be able to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted Certificate Authority (CA) to issue new certificates.

Note: F5 Product Development has determined that BIG-IP, BIG-IQ, and Enterprise Manager versions ship with vulnerable GnuTLS code. However, the vulnerable code is not used as a server or to make outgoing connections, and is not exploitable.