CVE-2010-0731

N/A Unknown
Published: March 26, 2010 Modified: April 29, 2026
View on NVD

Description

The gnutls_x509_crt_get_serial function in the GnuTLS library before 1.2.1, when running on big-endian, 64-bit platforms, calls the asn1_read_value with a pointer to the wrong data type and the wrong length value, which allows remote attackers to bypass the certificate revocation list (CRL) check and cause a stack-based buffer overflow via a crafted X.509 certificate, related to extraction of a serial number.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/39127
Source: secalert@redhat.com
http://www.securityfocus.com/bid/38959
Source: secalert@redhat.com
http://www.vupen.com/english/advisories/2010/0713
Source: secalert@redhat.com
Patch Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=573028
Source: secalert@redhat.com
Exploit
http://secunia.com/advisories/39127
Source: af854a3a-2127-422b-91ae-364da2661108
http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/4230
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.mandriva.com/security/advisories?name=MDVSA-2010:089
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2010-0167.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/38959
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2010/0713
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2010/1054
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=573028
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit

20 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.6%
82th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

gnu