Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

DNS:GNUTLS-DANE-BOF

Severity

High

Recommended

Yes

Category

DNS

Keywords

GnuTLS DANE dane.c Heap Buffer Overflow

Release Date

2014/02/24

Update Number

2348

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

DNS: GnuTLS DANE dane.c Heap Buffer Overflow


This signature detects attempts to exploit a known vulnerability in GnuTLS. The vulnerability is due to an error in the function dane_query_tlsa() in libdane/dane.c while processing TLSA records. A remote attacker could exploit this vulnerability by enticing a vulnerable client to open a malicious domain name, and then sending more than 4 TLSA records in a DNS response during DANE verification. A successful attack can result in arbitrary code execution, while an unsuccessful one will cause the vulnerable client application to terminate.

Extended Description

Buffer overflow in the dane_query_tlsa function in the DANE library (libdane) in GnuTLS 3.1.x before 3.1.15 and 3.2.x before 3.2.5 allows remote servers to cause a denial of service (memory corruption) via a response with more than four DANE entries.

Affected Products

  • gnu gnutls 3.1.0
  • gnu gnutls 3.1.1
  • gnu gnutls 3.1.10
  • gnu gnutls 3.1.11
  • gnu gnutls 3.1.12
  • gnu gnutls 3.1.13
  • gnu gnutls 3.1.14
  • gnu gnutls 3.1.2
  • gnu gnutls 3.1.3
  • gnu gnutls 3.1.4
  • gnu gnutls 3.1.5
  • gnu gnutls 3.1.6
  • gnu gnutls 3.1.7
  • gnu gnutls 3.1.8
  • gnu gnutls 3.1.9
  • gnu gnutls 3.2.0
  • gnu gnutls 3.2.1
  • gnu gnutls 3.2.2
  • gnu gnutls 3.2.3
  • gnu gnutls 3.2.4

References

  • BugTraq: 63326
  • CVE: CVE-2013-4466

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out