{
  "threat_severity" : "Important",
  "public_date" : "2020-06-03T00:00:00Z",
  "bugzilla" : {
    "description" : "gnutls: session resumption works without master key allowing MITM",
    "id" : "1843723",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1843723"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.4",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-345",
  "details" : [ "GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application.", "A flaw was found in GnuTLS, in versions starting from 3.6.4, where it does not session the ticket encryption key in a secure fashion by the application which is connecting. This flaw allows an attacker to craft a man-in-the-middle-attack, with the ability to bypass the TLS1.3 authentication and also recover older conversations when TLS1.2 is in use. The highest threat to this flaw is to confidentiality and integrity." ],
  "statement" : "GnuTLS versions as shipped with Red Hat Enterprise Linux 7 and earlier are not affected, as the bug was introduced in upstream at GnuTLS version 3.6.4. The older versions do not carry the affected code.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2020-06-22T00:00:00Z",
    "advisory" : "RHSA-2020:2637",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "gnutls-0:3.6.8-11.el8_2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2020-06-22T00:00:00Z",
    "advisory" : "RHSA-2020:2637",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "gnutls-0:3.6.8-11.el8_2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions",
    "release_date" : "2020-06-22T00:00:00Z",
    "advisory" : "RHSA-2020:2639",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.0",
    "package" : "gnutls-0:3.6.5-3.el8_0"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.1 Extended Update Support",
    "release_date" : "2020-06-22T00:00:00Z",
    "advisory" : "RHSA-2020:2638",
    "cpe" : "cpe:/a:redhat:rhel_eus:8.1",
    "package" : "gnutls-0:3.6.8-9.el8_1"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "gnutls",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "gnutls",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "gnutls",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2020-13777\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-13777\nhttps://www.gnutls.org/security-new.html#GNUTLS-SA-2020-06-03" ],
  "name" : "CVE-2020-13777",
  "mitigation" : {
    "value" : "There's no available mitigation for this issue.",
    "lang" : "en:us"
  },
  "csaw" : false
}