Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-3466

Опубликовано: 30 мая 2014
Источник: redhat
CVSS2: 6.8
EPSS Средний

Описание

Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.

A flaw was found in the way GnuTLS parsed session IDs from ServerHello messages of the TLS/SSL handshake. A malicious server could use this flaw to send an excessively long session ID value, which would trigger a buffer overflow in a connecting TLS/SSL client application using GnuTLS, causing the client application to crash or, possibly, execute arbitrary code.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4gnutlsWill not fix
Red Hat Enterprise Linux 6mingw32-gnutlsWill not fix
Red Hat Enterprise Linux 5gnutlsFixedRHSA-2014:059403.06.2014
Red Hat Enterprise Linux 6gnutlsFixedRHSA-2014:059503.06.2014
Red Hat Enterprise Linux 7gnutlsFixedRHSA-2014:068410.06.2014
RHEV 3.X Hypervisor and Agents for RHEL-6rhev-hypervisor6FixedRHSA-2014:081530.06.2014

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-130->CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=1101932gnutls: insufficient session id length check in _gnutls_read_server_hello (GNUTLS-SA-2014-3)

EPSS

Процентиль: 95%
0.20746
Средний

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
около 11 лет назад

Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.

nvd
около 11 лет назад

Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.

debian
около 11 лет назад

Buffer overflow in the read_server_hello function in lib/gnutls_handsh ...

github
около 3 лет назад

Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.

oracle-oval
около 11 лет назад

ELSA-2014-0595: gnutls security update (IMPORTANT)

EPSS

Процентиль: 95%
0.20746
Средний

6.8 Medium

CVSS2