Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-1948

Опубликовано: 21 мая 2008
Источник: ubuntu
Приоритет: medium
CVSS2: 10

Описание

The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a zero value for the length of Server Names, which leads to a buffer overflow in session resumption data in the pack_security_parameters function, aka GNUTLS-SA-2008-1-1.

РелизСтатусПримечание
dapper

released

1.2.9-2ubuntu1.2
devel

DNE

feisty

DNE

gutsy

DNE

hardy

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

released

2.0.4-1ubuntu3
feisty

released

1.4.4-3ubuntu0.1
gutsy

released

1.6.3-1ubuntu0.1
hardy

released

2.0.4-1ubuntu2.1
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

2.2.5-1
feisty

DNE

gutsy

DNE

hardy

DNE

upstream

released

2.2.5

Показывать по

10 Critical

CVSS2

Связанные уязвимости

redhat
около 17 лет назад

The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a zero value for the length of Server Names, which leads to a buffer overflow in session resumption data in the pack_security_parameters function, aka GNUTLS-SA-2008-1-1.

nvd
около 17 лет назад

The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a zero value for the length of Server Names, which leads to a buffer overflow in session resumption data in the pack_security_parameters function, aka GNUTLS-SA-2008-1-1.

debian
около 17 лет назад

The _gnutls_server_name_recv_params function in lib/ext_server_name.c ...

github
около 3 лет назад

The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a zero value for the length of Server Names, which leads to a buffer overflow in session resumption data in the pack_security_parameters function, aka GNUTLS-SA-2008-1-1.

oracle-oval
около 17 лет назад

ELSA-2008-0489: gnutls security update (CRITICAL)

10 Critical

CVSS2