<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Gnutls — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/gnutls/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 18:16:28 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/gnutls/feed.xml" rel="self" type="application/rss+xml"/><item><title>GnuTLS DTLS Handshake Parsing Flaw (CVE-2026-33845)</title><link>https://feed.craftedsignal.io/briefs/2026-04-gnutls-dtls-flaw/</link><pubDate>Thu, 30 Apr 2026 18:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-gnutls-dtls-flaw/</guid><description>A flaw in GnuTLS DTLS handshake parsing allows malformed fragments with zero length and non-zero offset, leading to an integer underflow during reassembly and resulting in an out-of-bounds read, potentially causing information disclosure or denial of service.</description><content:encoded><![CDATA[<p>CVE-2026-33845 describes a vulnerability in the GnuTLS library related to the parsing of DTLS handshake fragments. The vulnerability stems from improper handling of malformed fragments that have a zero length but a non-zero offset. This leads to an integer underflow during the reassembly process, which then triggers an out-of-bounds read. The vulnerability is remotely exploitable, meaning an attacker could potentially trigger it without needing local access. Successful exploitation can lead to information disclosure or a denial-of-service condition. The affected component is the GnuTLS library, which is used by various applications for secure communication.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious DTLS handshake fragment with a zero length and non-zero offset.</li>
<li>The attacker sends the malformed DTLS handshake fragment to a vulnerable GnuTLS server.</li>
<li>The GnuTLS library receives the fragment and begins the reassembly process.</li>
<li>The integer underflow occurs when calculating the correct offset for the fragment reassembly.</li>
<li>The integer underflow leads to an out-of-bounds memory read operation.</li>
<li>The out-of-bounds read allows the attacker to potentially read sensitive information from the server&rsquo;s memory.</li>
<li>Alternatively, the out-of-bounds read may cause the server to crash, resulting in a denial-of-service.</li>
<li>The attacker achieves either information disclosure or denial-of-service based on the server&rsquo;s response to the out-of-bounds read.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33845 can lead to a denial-of-service condition, impacting the availability of services relying on the vulnerable GnuTLS library. The out-of-bounds read can also potentially expose sensitive information from the server&rsquo;s memory, leading to data breaches. Given the widespread use of GnuTLS in various applications, a successful widespread attack could affect numerous organizations and users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches for GnuTLS provided by Red Hat or other vendors to address CVE-2026-33845.</li>
<li>Monitor network traffic for malformed DTLS handshake fragments with zero length and non-zero offset that may indicate exploitation attempts targeting CVE-2026-33845.</li>
<li>Deploy the Sigma rule <code>DetectGnuTLSDTLSMalformedFragment</code> to identify suspicious network connections associated with the vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>denial-of-service</category><category>information-disclosure</category><category>gnutls</category></item><item><title>GNUTLS Denial of Service via Malformed ClientHello (CVE-2026-1584)</title><link>https://feed.craftedsignal.io/briefs/2026-04-gnutls-dos/</link><pubDate>Thu, 09 Apr 2026 18:16:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-gnutls-dos/</guid><description>A remote, unauthenticated attacker can exploit CVE-2026-1584 in gnutls by sending a specially crafted ClientHello message with an invalid Pre-Shared Key (PSK) binder value during the TLS handshake, leading to a NULL pointer dereference and a denial-of-service condition.</description><content:encoded><![CDATA[<p>CVE-2026-1584 is a vulnerability found in the gnutls library, a widely used implementation of the TLS protocol. This vulnerability allows an unauthenticated, remote attacker to cause a denial-of-service (DoS) condition on a server utilizing a vulnerable version of gnutls. The attack involves sending a specially crafted TLS ClientHello message containing an invalid Pre-Shared Key (PSK) binder value. This malformed message triggers a NULL pointer dereference within the gnutls library, leading to a server crash. The vulnerability was reported on April 9, 2026, and affects systems using gnutls for TLS communication. This vulnerability poses a significant risk to services relying on gnutls for secure communication, potentially disrupting availability and impacting users.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a server utilizing a vulnerable version of gnutls.</li>
<li>Attacker crafts a TLS ClientHello message.</li>
<li>Attacker modifies the ClientHello message to include an invalid Pre-Shared Key (PSK) binder value.</li>
<li>Attacker sends the crafted ClientHello message to the target server.</li>
<li>The server&rsquo;s gnutls library processes the malformed ClientHello message.</li>
<li>Due to the invalid PSK binder, a NULL pointer dereference occurs within gnutls.</li>
<li>The NULL pointer dereference causes the gnutls process to crash.</li>
<li>The server becomes unavailable, resulting in a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-1584 leads to a denial-of-service condition, rendering the affected server unavailable. The impact is service disruption for any application relying on the vulnerable gnutls instance. There is no specific victim count available; however, any server using a vulnerable version of gnutls is susceptible. The vulnerable software is used across multiple sectors, including web servers, mail servers, and VPN gateways. A successful attack disrupts TLS communication, preventing users from accessing services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for malformed TLS ClientHello messages containing invalid PSK binder values to detect potential exploitation attempts. (See Sigma rule &ldquo;Detect Malformed TLS ClientHello with Invalid PSK Binder&rdquo;)</li>
<li>Upgrade to a patched version of gnutls that addresses CVE-2026-1584 to remediate the vulnerability.</li>
<li>Implement rate limiting on TLS connections to mitigate the impact of DoS attacks.</li>
<li>Enable verbose logging on TLS connections to aid in the detection and analysis of exploitation attempts (e.g., webserver logs).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-1584</category><category>denial-of-service</category><category>gnutls</category></item><item><title>GnuTLS DTLS Handshake Heap Overflow Vulnerability (CVE-2026-33846)</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-gnutls-dtls-overflow/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-gnutls-dtls-overflow/</guid><description>A heap buffer overflow vulnerability, CVE-2026-33846, exists in the DTLS handshake fragment reassembly logic of GnuTLS, allowing unauthenticated remote attackers to cause application crashes or potential memory corruption by sending crafted DTLS fragments with conflicting message lengths.</description><content:encoded><![CDATA[<p>A heap buffer overflow vulnerability has been identified in the DTLS handshake fragment reassembly logic of GnuTLS. The vulnerability, tracked as CVE-2026-33846, resides within the <code>merge_handshake_packet()</code> function. This function is responsible for matching and merging incoming DTLS handshake fragments. The core issue is the lack of validation for the <code>message_length</code> field across different fragments belonging to the same logical message. An attacker can exploit this flaw by transmitting malicious DTLS fragments that contain inconsistent <code>message_length</code> values. This inconsistency leads the GnuTLS implementation to allocate a buffer based on a smaller, initial fragment but subsequently attempts to write data beyond the allocated buffer&rsquo;s boundaries using the larger, conflicting fragments. This out-of-bounds write on the heap can be triggered remotely without requiring any form of authentication, making it a critical vulnerability. Successful exploitation can lead to application crashes or, potentially, arbitrary memory corruption.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker initiates a DTLS handshake with a vulnerable GnuTLS server.</li>
<li>The attacker sends a first DTLS handshake fragment with a small <code>message_length</code> value.</li>
<li>The vulnerable <code>merge_handshake_packet()</code> function allocates a heap buffer based on the initial, smaller <code>message_length</code>.</li>
<li>Attacker sends a subsequent DTLS handshake fragment for the same handshake message with a larger, inconsistent <code>message_length</code> value.</li>
<li><code>merge_handshake_packet()</code> incorrectly merges the second fragment into the allocated buffer without proper bounds checking.</li>
<li>The write operation overflows the allocated heap buffer, corrupting adjacent memory.</li>
<li>The application crashes due to memory corruption, or the attacker potentially gains further control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33846 can lead to denial-of-service conditions due to application crashes. Memory corruption could allow for arbitrary code execution, but this is a less likely outcome. Given the widespread use of GnuTLS in various applications and systems, a large number of services could be impacted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for DTLS handshakes with inconsistent <code>message_length</code> values in fragmented handshake messages using the provided Sigma rule <code>Detect DTLS Handshake Fragment Length Mismatch</code>.</li>
<li>Apply available patches from GnuTLS to remediate CVE-2026-33846.</li>
<li>Implement rate limiting for DTLS handshake requests to mitigate potential denial-of-service attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-33846</category><category>dtls</category><category>heap overflow</category><category>gnutls</category><category>network</category></item></channel></rss>