Learn about CVE-2017-5337 affecting GnuTLS versions before 3.3.26 and 3.5.x before 3.5.8. Find out how remote attackers can exploit heap-based buffer overflows using crafted OpenPGP certificates.
GnuTLS versions before 3.3.26 and 3.5.x before 3.5.8 are susceptible to multiple heap-based buffer overflows, allowing remote attackers to exploit the vulnerabilities using a specially crafted OpenPGP certificate.
Understanding CVE-2017-5337
What is CVE-2017-5337?
The read_attribute function in GnuTLS versions before 3.3.26 and 3.5.x before 3.5.8 is vulnerable to multiple heap-based buffer overflows.
The Impact of CVE-2017-5337
These vulnerabilities can be exploited by remote attackers using a specifically designed OpenPGP certificate to cause an impact that has not been specified.
Technical Details of CVE-2017-5337
Vulnerability Description
Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
Affected Systems and Versions
Exploitation Mechanism
Attackers from remote locations can exploit these vulnerabilities by using a specifically designed OpenPGP certificate.
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates