top of page
perceptive_background_267k.jpg

Mod_gnutls is a TLS module for Apache HTTPD based on GnuTLS. In versions prior to 0.12.3 and 0.13.0, code for client certificate verification imported the certi…

Published:

23 maart 2026 om 23:00:00

Alert date:

24 maart 2026 om 19:05:20

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Network Infrastructure

Mod_gnutls, a TLS module for Apache HTTPD based on GnuTLS, contains a buffer overflow vulnerability in versions prior to 0.12.3 and 0.13.0. The vulnerability occurs during client certificate verification when the certificate chain is imported into a fixed-size array without proper bounds checking. While no attacker-controlled data is written to the stack buffer, the issue can cause segfaults and potential stack corruption. Only servers using client certificate verification are affected, as the default configuration ignores client certificates. The vulnerability has been fixed in versions 0.12.3 and 0.13.0 with different approaches.

Technical details

Mitigation steps:

Affected products:

mod_gnutls
Apache HTTPD
GnuTLS

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page