vulnerability
FreeBSD: VID-EF5B4F5F-A658-11EA-80D7-001CC0382B2F (CVE-2020-13777): GnuTLS -- flaw in TLS session ticket key construction
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:M/Au:N/C:P/I:P/A:N) | Jun 3, 2020 | Jun 5, 2020 | Oct 20, 2020 |
Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
Jun 3, 2020
Added
Jun 5, 2020
Modified
Oct 20, 2020
Description
GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application.
Solution
freebsd-upgrade-package-gnutls
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.