Impact
GnuTLS contains a flaw that allows a remote, unauthenticated attacker to send a crafted ClientHello message with an invalid Pre‑Shared Key binder during the TLS handshake. The invalid binder triggers a null pointer dereference, causing the server to crash and resulting in a denial of service. This weakness is a classic null dereference issue (CWE‑476).
Affected Systems
The vulnerability affects Red Hat Enterprise Linux versions 6 through 9, Red Hat Enterprise Linux 10, Red Hat Hardened Images, and Red Hat OpenShift Container Platform 4, all of which incorporate the affected GnuTLS library. The specific software component impacted is the GnuTLS implementation used within these distributions.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity risk, while the EPSS score of less than 1% suggests a low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires only an unauthenticated network connection to the TLS service that uses the flawed GnuTLS version; no privileged access or additional prerequisites are stated.
OpenCVE Enrichment