CVE-2020-12823

CRITICAL

OpenConnect 8.09 - Buffer Overflow

Title source: llm
STIX 2.1

Description

OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c.

References (9)

Core 9
Core References
Patch, Third Party Advisory x_refsource_misc
https://gitlab.com/openconnect/openconnect/-/merge_requests/108
Exploit, Third Party Advisory x_refsource_misc
https://bugs.gentoo.org/721570
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/05/msg00015.html
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/202006-15
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00039.html
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00056.html

Scores

CVSS v3 9.8
EPSS 0.0186
EPSS Percentile 83.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-120
Status published
Products (7)
debian/debian_linux 8.0
fedoraproject/fedora 30
fedoraproject/fedora 31
fedoraproject/fedora 32
infradead/openconnect 8.09
opensuse/leap 15.1
opensuse/leap 15.2
Published May 12, 2020
Tracked Since Feb 18, 2026