The host is installed with gnutls in RHEL 6 and is prone to privilege escalation vulnerabilities. The flaws are present in the application, which fails to properly perform date/time check on CA certificates. Successful exploitation could allow attackers to invoke expired certificates.