CVE-2024-12243

Published: February 11, 2025Last modified: November 28, 2025

Description

A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.

Severity score breakdown

ParameterValue
Base score5.3
Attack VectorNETWORK
Attack complexityLOW
Privileges requiredNONE
User interactionNONE
ScopeUNCHANGED
ConfidentialityNONE
Integrity impactNONE
Availability impactLOW
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Notes

The real problem seems to the the libtasn1 bug (listed in the references section above) that has it's own report: CVE-2024-12133 GnuTLS issue for this is https://gitlab.com/gnutls/gnutls/-/issues/1553 The backport to 3.7 is in https://gitlab.com/gnutls/gnutls/-/merge_requests/1937

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSgnutlsVulnerable (3.7.8-r2)
25 LTSgnutlsVulnerable (3.8.8-r0)
StreamgnutlsVulnerable (3.8.8-r0)

References

ON THIS PAGE