


Perceptive Security
SOC/SIEM Consultancy

Mod_gnutls is a TLS module for Apache HTTPD based on GnuTLS. In versions prior to 0.12.3 and 0.13.0, code for client certificate verification imported the certiā¦
Published:
23 maart 2026 om 23:00:00
Alert date:
24 maart 2026 om 19:05:20
Source:
nvd.nist.gov
Web Technologies, Network Infrastructure
Mod_gnutls, a TLS module for Apache HTTPD based on GnuTLS, contains a buffer overflow vulnerability in versions prior to 0.12.3 and 0.13.0. The vulnerability occurs during client certificate verification when the certificate chain is imported into a fixed-size array without proper bounds checking. While no attacker-controlled data is written to the stack buffer, the issue can cause segfaults and potential stack corruption. Only servers using client certificate verification are affected, as the default configuration ignores client certificates. The vulnerability has been fixed in versions 0.12.3 and 0.13.0 with different approaches.
Technical details
Mitigation steps:
Affected products:
mod_gnutls
Apache HTTPD
GnuTLS
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-33307
https://github.com/airtower-luna/mod_gnutls/commit/bf4f08c49acae528e97885082cdee460f4534dc1
https://github.com/airtower-luna/mod_gnutls/security/advisories/GHSA-gjpm-55p4-c76r
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
