Gnu

Gnutls

73 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 8.65%
  • Veröffentlicht 03.07.2013 18:55:01
  • Zuletzt bearbeitet 29.04.2026 01:13:23

The _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in GnuTLS 2.12.23 allows remote attackers to cause a denial of service (buffer over-read and crash) via a crafted padding length. NOTE: this might be due to an incorrect fix for CVE-2...

Exploit
  • EPSS 1.22%
  • Veröffentlicht 08.02.2013 19:55:01
  • Zuletzt bearbeitet 29.04.2026 01:13:23

The TLS implementation in GnuTLS before 2.12.23, 3.0.x before 3.0.28, and 3.1.x before 3.1.7 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows rem...

Exploit
  • EPSS 9.56%
  • Veröffentlicht 26.03.2012 19:55:01
  • Zuletzt bearbeitet 29.04.2026 01:13:23

gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a c...

Exploit
  • EPSS 10.17%
  • Veröffentlicht 26.03.2012 19:55:01
  • Zuletzt bearbeitet 29.04.2026 01:13:23

The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap mem...

  • EPSS 1.06%
  • Veröffentlicht 13.03.2012 22:55:03
  • Zuletzt bearbeitet 29.04.2026 01:13:23

Double free vulnerability in libgnutls in GnuTLS before 3.0.14 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted certificate list.

  • EPSS 0.26%
  • Veröffentlicht 06.01.2012 01:55:01
  • Zuletzt bearbeitet 29.04.2026 01:13:23

The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain error-handling code only if there is a specific relationship between a padding length and the ciphertext size, which makes it easier for remote attackers to recover partial plainte...

  • EPSS 1.39%
  • Veröffentlicht 08.12.2011 20:55:00
  • Zuletzt bearbeitet 29.04.2026 01:13:23

Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to cause a denial of s...

  • EPSS 0.27%
  • Veröffentlicht 24.05.2010 19:30:01
  • Zuletzt bearbeitet 29.04.2026 01:13:23

The _gnutls_x509_oid2mac_algorithm function in lib/gnutls_algorithms.c in GnuTLS before 1.4.2 allows remote attackers to cause a denial of service (crash) via a crafted X.509 certificate that uses a hash algorithm that is not supported by GnuTLS, whi...

Exploit
  • EPSS 1.63%
  • Veröffentlicht 26.03.2010 18:30:00
  • Zuletzt bearbeitet 29.04.2026 01:13:23

The gnutls_x509_crt_get_serial function in the GnuTLS library before 1.2.1, when running on big-endian, 64-bit platforms, calls the asn1_read_value with a pointer to the wrong data type and the wrong length value, which allows remote attackers to byp...

Exploit
  • EPSS 1.97%
  • Veröffentlicht 09.11.2009 17:30:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Secu...