Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2014-0595

Опубликовано: 03 июн. 2014
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2014-0595: gnutls security update (IMPORTANT)

[2.8.5-14]

  • fix session ID length check (#1102024)

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

gnutls

2.8.5-14.el6_5

gnutls-devel

2.8.5-14.el6_5

gnutls-guile

2.8.5-14.el6_5

gnutls-utils

2.8.5-14.el6_5

Oracle Linux i686

gnutls

2.8.5-14.el6_5

gnutls-devel

2.8.5-14.el6_5

gnutls-guile

2.8.5-14.el6_5

gnutls-utils

2.8.5-14.el6_5

Связанные CVE

Связанные уязвимости

ubuntu
около 11 лет назад

Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.

redhat
около 11 лет назад

Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.

nvd
около 11 лет назад

Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.

debian
около 11 лет назад

Buffer overflow in the read_server_hello function in lib/gnutls_handsh ...

github
около 3 лет назад

Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.