7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.001 Low
EPSS
Percentile
25.1%
Mod_gnutls is a TLS module for Apache HTTPD based on GnuTLS. Versions from
0.9.0 to 0.12.0 (including) did not properly fail blocking read operations
on TLS connections when the transport hit timeouts. Instead it entered an
endless loop retrying the read operation, consuming CPU resources. This
could be exploited for denial of service attacks. If trace level logging
was enabled, it would also produce an excessive amount of log output during
the loop, consuming disk space. The problem has been fixed in commit
d7eec4e598158ab6a98bf505354e84352f9715ec, please update to version 0.12.1.
There are no workarounds, users who cannot update should apply the errno
fix detailed in the security advisory.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | mod-gnutls | < any | UNKNOWN |
ubuntu | 22.04 | noarch | mod-gnutls | < any | UNKNOWN |
ubuntu | 23.10 | noarch | mod-gnutls | < any | UNKNOWN |
bugs.debian.org/cgi-bin/bugreport.cgi?bug=942737#25
github.com/airtower-luna/mod_gnutls/commit/d7eec4e598158ab6a98bf505354e84352f9715ec
github.com/airtower-luna/mod_gnutls/commit/d7eec4e598158ab6a98bf505354e84352f9715ec (mod_gnutls/0.12.1)
github.com/airtower-luna/mod_gnutls/security/advisories/GHSA-6cfv-fvgm-7pc8
launchpad.net/bugs/cve/CVE-2023-25824
nvd.nist.gov/vuln/detail/CVE-2023-25824
security-tracker.debian.org/tracker/CVE-2023-25824
www.cve.org/CVERecord?id=CVE-2023-25824