Описание
Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | gnutls | Will not fix | ||
Red Hat Enterprise Linux 6 | gnutls | Fixed | RHSA-2017:0574 | 21.03.2017 |
Red Hat Enterprise Linux 7 | gnutls | Fixed | RHSA-2017:2292 | 01.08.2017 |
Показывать по
Дополнительная информация
Статус:
EPSS
5.3 Medium
CVSS3
Связанные уязвимости
Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
Multiple heap-based buffer overflows in the read_attribute function in ...
Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
Уязвимость функции read_attribute в библиотеке GnuTLS, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказывать воздействие на целостность и доступность данных
EPSS
5.3 Medium
CVSS3