Gnu

Gnutls

73 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.16%
  • Veröffentlicht 07.05.2026 12:16:17
  • Zuletzt bearbeitet 14.05.2026 23:16:36

A flaw was found in gnutls. Servers configured with RSA-PSK (Rivest–Shamir–Adleman – Pre-Shared Key) wrongfully matched usernames containing a NUL character with truncated usernames. A remote attacker could exploit this by sending a specially crafted...

  • EPSS 0.05%
  • Veröffentlicht 30.04.2026 17:41:34
  • Zuletzt bearbeitet 05.05.2026 03:03:19

A flaw in GnuTLS DTLS handshake parsing allows malformed fragments with zero length and non-zero offset, leading to an integer underflow during reassembly and resulting in an out-of-bounds read. This issue is remotely exploitable and may cause inform...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 30.04.2026 17:41:28
  • Zuletzt bearbeitet 11.05.2026 19:15:57

A flaw was found in gnutls. A remote attacker could exploit this vulnerability by presenting a specially crafted Online Certificate Status Protocol (OCSP) response during a TLS handshake. Due to a logic error in how gnutls processes multi-record OCSP...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 30.04.2026 17:37:05
  • Zuletzt bearbeitet 07.05.2026 02:09:04

A flaw was found in gnutls. This vulnerability occurs because gnutls performs case-sensitive comparisons of `nameConstraints` labels, specifically for `dNSName` (DNS) or `rfc822Name` (email) constraints within `excludedSubtrees` or `permittedSubtrees...

  • EPSS 0.11%
  • Veröffentlicht 09.04.2026 18:16:44
  • Zuletzt bearbeitet 03.05.2026 14:16:26

A flaw was found in gnutls. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted ClientHello message with an invalid Pre-Shared Key (PSK) binder value during the TLS handshake. This can lead to a NULL point...

  • EPSS 0.29%
  • Veröffentlicht 10.07.2025 09:41:46
  • Zuletzt bearbeitet 20.04.2026 22:16:22

A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL point...

  • EPSS 0.34%
  • Veröffentlicht 10.07.2025 08:05:26
  • Zuletzt bearbeitet 12.05.2026 13:16:41

A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate cont...

  • EPSS 0.23%
  • Veröffentlicht 10.07.2025 08:04:57
  • Zuletzt bearbeitet 12.05.2026 13:16:40

A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS wil...

Exploit
  • EPSS 1.61%
  • Veröffentlicht 16.01.2024 14:15:48
  • Zuletzt bearbeitet 21.11.2024 08:46:53

A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, r...

Exploit
  • EPSS 0.95%
  • Veröffentlicht 16.01.2024 12:15:45
  • Zuletzt bearbeitet 24.03.2026 12:16:10

A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing s...