Gnu

Gnutls

68 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.39%
  • Veröffentlicht 13.11.2008 01:00:01
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS before 2.6.1 trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate, which allows man-in-the-middle attackers t...

Exploit
  • EPSS 12.13%
  • Veröffentlicht 08.08.2008 19:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Use-after-free vulnerability in the _gnutls_handshake_hash_buffers_clear function in lib/gnutls_handshake.c in libgnutls in GnuTLS 2.3.5 through 2.4.0 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via...

  • EPSS 9.43%
  • Veröffentlicht 21.05.2008 13:24:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Ran...

Exploit
  • EPSS 15.17%
  • Veröffentlicht 21.05.2008 13:24:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The _gnutls_recv_client_kx_message function in lib/gnutls_kx.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 continues to process Client Hello messages within a TLS message after one has already been processed, which allows remote attackers to c...

Exploit
  • EPSS 22.27%
  • Veröffentlicht 21.05.2008 13:24:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows ...

  • EPSS 3.05%
  • Veröffentlicht 14.09.2006 19:07:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signe...

  • EPSS 1.37%
  • Veröffentlicht 03.05.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The "record packet parsing" in GnuTLS 1.2 before 1.2.3 and 1.0 before 1.0.25 allows remote attackers to cause a denial of service, possibly related to padding bytes in gnutils_cipher.c.

  • EPSS 0.87%
  • Veröffentlicht 31.12.2004 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

X.509 Certificate Signature Verification in Gnu transport layer security library (GnuTLS) 1.0.16 allows remote attackers to cause a denial of service (CPU consumption) via certificates containing long chains and signed with large RSA keys.