Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2008-1948

Опубликовано: 21 мая 2008
Источник: nvd
CVSS2: 10
EPSS Средний

Описание

The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a zero value for the length of Server Names, which leads to a buffer overflow in session resumption data in the pack_security_parameters function, aka GNUTLS-SA-2008-1-1.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:gnu:gnutls:1.0.18:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.0.19:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.0.20:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.0.21:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.0.22:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.0.23:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.0.24:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.0.25:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.1.13:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.1.14:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.1.15:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.1.16:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.1.17:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.1.18:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.1.19:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.1.20:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.1.21:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.1.22:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.1.23:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.2.9:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.5.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.7.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.7.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.7.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.7.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.7.9:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.7.10:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.7.11:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.7.12:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.7.13:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.7.14:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.7.15:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.7.16:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.7.17:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.7.18:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:1.7.19:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.1.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.1.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.3.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.3.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.3.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.3.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.3.9:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.3.10:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:2.3.11:*:*:*:*:*:*:*

EPSS

Процентиль: 96%
0.23881
Средний

10 Critical

CVSS2

Дефекты

CWE-189

Связанные уязвимости

ubuntu
около 17 лет назад

The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a zero value for the length of Server Names, which leads to a buffer overflow in session resumption data in the pack_security_parameters function, aka GNUTLS-SA-2008-1-1.

redhat
около 17 лет назад

The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a zero value for the length of Server Names, which leads to a buffer overflow in session resumption data in the pack_security_parameters function, aka GNUTLS-SA-2008-1-1.

debian
около 17 лет назад

The _gnutls_server_name_recv_params function in lib/ext_server_name.c ...

github
около 3 лет назад

The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a zero value for the length of Server Names, which leads to a buffer overflow in session resumption data in the pack_security_parameters function, aka GNUTLS-SA-2008-1-1.

oracle-oval
около 17 лет назад

ELSA-2008-0489: gnutls security update (CRITICAL)

EPSS

Процентиль: 96%
0.23881
Средний

10 Critical

CVSS2

Дефекты

CWE-189
Уязвимость CVE-2008-1948