Gnu

Gnutls

68 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.26%
  • Published 06.01.2012 01:55:01
  • Last modified 11.04.2025 00:51:21

The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain error-handling code only if there is a specific relationship between a padding length and the ciphertext size, which makes it easier for remote attackers to recover partial plainte...

  • EPSS 1.32%
  • Published 08.12.2011 20:55:00
  • Last modified 11.04.2025 00:51:21

Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to cause a denial of s...

  • EPSS 0.27%
  • Published 24.05.2010 19:30:01
  • Last modified 11.04.2025 00:51:21

The _gnutls_x509_oid2mac_algorithm function in lib/gnutls_algorithms.c in GnuTLS before 1.4.2 allows remote attackers to cause a denial of service (crash) via a crafted X.509 certificate that uses a hash algorithm that is not supported by GnuTLS, whi...

Exploit
  • EPSS 3.09%
  • Published 26.03.2010 18:30:00
  • Last modified 11.04.2025 00:51:21

The gnutls_x509_crt_get_serial function in the GnuTLS library before 1.2.1, when running on big-endian, 64-bit platforms, calls the asn1_read_value with a pointer to the wrong data type and the wrong length value, which allows remote attackers to byp...

Exploit
  • EPSS 2.84%
  • Published 09.11.2009 17:30:00
  • Last modified 09.04.2025 00:30:58

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Secu...

  • EPSS 2.7%
  • Published 12.08.2009 10:30:01
  • Last modified 09.04.2025 00:30:58

libgnutls in GnuTLS before 2.8.2 does not properly handle a '\0' character in a domain name in the subject's (1) Common Name (CN) or (2) Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof a...

  • EPSS 2.06%
  • Published 30.07.2009 19:30:00
  • Last modified 09.04.2025 00:30:58

The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificat...

Exploit
  • EPSS 5.34%
  • Published 30.04.2009 20:30:00
  • Last modified 09.04.2025 00:30:58

lib/gnutls_pk.c in libgnutls in GnuTLS 2.5.0 through 2.6.5 generates RSA keys stored in DSA structures, instead of the intended DSA keys, which might allow remote attackers to spoof signatures on certificates or have unspecified other impact by lever...

Exploit
  • EPSS 17.76%
  • Published 30.04.2009 20:30:00
  • Last modified 09.04.2025 00:30:58

lib/pk-libgcrypt.c in libgnutls in GnuTLS before 2.6.6 does not properly handle invalid DSA signatures, which allows remote attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a malformed DSA key ...

  • EPSS 0.58%
  • Published 30.04.2009 20:30:00
  • Last modified 09.04.2025 00:30:58

gnutls-cli in GnuTLS before 2.6.6 does not verify the activation and expiration times of X.509 certificates, which allows remote attackers to successfully present a certificate that is (1) not yet valid or (2) no longer valid, related to lack of time...