Gnu

Gnutls

68 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.92%
  • Veröffentlicht 12.03.2021 19:15:13
  • Zuletzt bearbeitet 21.11.2024 05:46:10

A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.

Exploit
  • EPSS 3.4%
  • Veröffentlicht 04.09.2020 15:15:10
  • Zuletzt bearbeitet 21.11.2024 05:15:26

An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the app...

  • EPSS 1.52%
  • Veröffentlicht 04.06.2020 07:15:10
  • Zuletzt bearbeitet 21.11.2024 05:01:50

GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-...

  • EPSS 11.49%
  • Veröffentlicht 03.04.2020 13:15:13
  • Zuletzt bearbeitet 21.11.2024 04:58:01

GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 '\0' bytes instead of a random value, and thus contributes...

  • EPSS 0.58%
  • Veröffentlicht 27.01.2020 16:15:10
  • Zuletzt bearbeitet 21.11.2024 02:22:45

GnuTLS before 3.3.13 does not validate that the signature algorithms match when importing a certificate.

  • EPSS 1.06%
  • Veröffentlicht 20.12.2019 14:15:11
  • Zuletzt bearbeitet 21.11.2024 02:38:16

GnuTLS incorrectly validates the first byte of padding in CBC modes

Exploit
  • EPSS 0.37%
  • Veröffentlicht 01.04.2019 15:29:01
  • Zuletzt bearbeitet 21.11.2024 04:42:39

It was discovered in gnutls before version 3.6.7 upstream that there is an uninitialized pointer access in gnutls versions 3.6.3 or later which can be triggered by certain post-handshake messages.

Exploit
  • EPSS 2.12%
  • Veröffentlicht 27.03.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:42:37

A vulnerability was found in gnutls versions from 3.5.8 before 3.6.7. A memory corruption (double free) vulnerability in the certificate verification API. Any client or server application that verifies X.509 certificates with GnuTLS 3.5.8 or later is...

  • EPSS 0.04%
  • Veröffentlicht 03.12.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:29

A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this ...

  • EPSS 0.01%
  • Veröffentlicht 22.08.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:07

A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain ...