A flaw was found in gnutls. Servers configured with RSA-PSK (Rivest–Shamir–Adleman – Pre-Shared Key) wrongfully matched usernames containing a NUL character with truncated usernames. A remote attacker could exploit this by sending a specially crafted username, leading to an authentication bypass. This vulnerability allows an attacker to gain unauthorized access by circumventing the authentication process.
| Vendor | Product | Versions |
|---|---|---|
| red hat | red hat enterprise linux | — |
Updated severity to CRITICAL, corrected exploit availability to false, and provided a new description with additional details.
Initial creation