Unrated severityNVD Advisory· Published Mar 26, 2012· Updated Apr 29, 2026
CVE-2012-1573
CVE-2012-1573
Description
gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structure.
Affected products
93cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*+ 91 more
- cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*range: <=2.12.16
- cpe:2.3:a:gnu:gnutls:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.10.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.10.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.10:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.11:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.12:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.13:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.14:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.15:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.8:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.12.9:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:2.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.9:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
27- blog.mudynamics.com/2012/03/20/gnutls-and-libtasn1-vulns/nvdExploit
- www.gnu.org/software/gnutls/security.htmlnvdVendor Advisory
- archives.neohapsis.com/archives/bugtraq/2012-03/0099.htmlnvd
- article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5910nvd
- article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5912nvd
- git.savannah.gnu.org/gitweb/nvd
- git.savannah.gnu.org/gitweb/nvd
- lists.fedoraproject.org/pipermail/package-announce/2012-April/077071.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2012-March/076496.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.htmlnvd
- osvdb.org/80259nvd
- rhn.redhat.com/errata/RHSA-2012-0429.htmlnvd
- rhn.redhat.com/errata/RHSA-2012-0488.htmlnvd
- rhn.redhat.com/errata/RHSA-2012-0531.htmlnvd
- secunia.com/advisories/48488nvd
- secunia.com/advisories/48511nvd
- secunia.com/advisories/48596nvd
- secunia.com/advisories/48712nvd
- secunia.com/advisories/57260nvd
- www.debian.org/security/2012/dsa-2441nvd
- www.mandriva.com/security/advisoriesnvd
- www.openwall.com/lists/oss-security/2012/03/21/4nvd
- www.openwall.com/lists/oss-security/2012/03/21/5nvd
- www.securityfocus.com/bid/52667nvd
- www.securitytracker.com/idnvd
- www.ubuntu.com/usn/USN-1418-1nvd
- bugzilla.redhat.com/show_bug.cginvd
News mentions
0No linked articles in our index yet.