Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-0731

Опубликовано: 26 мар. 2010
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

The gnutls_x509_crt_get_serial function in the GnuTLS library before 1.2.1, when running on big-endian, 64-bit platforms, calls the asn1_read_value with a pointer to the wrong data type and the wrong length value, which allows remote attackers to bypass the certificate revocation list (CRL) check and cause a stack-based buffer overflow via a crafted X.509 certificate, related to extraction of a serial number.

РелизСтатусПримечание
dapper

ignored

end of life
devel

DNE

hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

not-affected

1.2.9-2ubuntu1.7
devel

DNE

hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

DNE

upstream

released

1.2.1

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

not-affected

2.0.4-1ubuntu2.6
intrepid

DNE

jaunty

DNE

karmic

DNE

upstream

not-affected

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

2.8.5-2
hardy

DNE

intrepid

not-affected

2.4.1-1ubuntu0.4
jaunty

not-affected

2.4.2-6ubuntu0.1
karmic

not-affected

2.8.3-2
upstream

not-affected

Показывать по

EPSS

Процентиль: 81%
0.01631
Низкий

7.5 High

CVSS2

Связанные уязвимости

redhat
больше 15 лет назад

The gnutls_x509_crt_get_serial function in the GnuTLS library before 1.2.1, when running on big-endian, 64-bit platforms, calls the asn1_read_value with a pointer to the wrong data type and the wrong length value, which allows remote attackers to bypass the certificate revocation list (CRL) check and cause a stack-based buffer overflow via a crafted X.509 certificate, related to extraction of a serial number.

nvd
больше 15 лет назад

The gnutls_x509_crt_get_serial function in the GnuTLS library before 1.2.1, when running on big-endian, 64-bit platforms, calls the asn1_read_value with a pointer to the wrong data type and the wrong length value, which allows remote attackers to bypass the certificate revocation list (CRL) check and cause a stack-based buffer overflow via a crafted X.509 certificate, related to extraction of a serial number.

debian
больше 15 лет назад

The gnutls_x509_crt_get_serial function in the GnuTLS library before 1 ...

github
больше 3 лет назад

The gnutls_x509_crt_get_serial function in the GnuTLS library before 1.2.1, when running on big-endian, 64-bit platforms, calls the asn1_read_value with a pointer to the wrong data type and the wrong length value, which allows remote attackers to bypass the certificate revocation list (CRL) check and cause a stack-based buffer overflow via a crafted X.509 certificate, related to extraction of a serial number.

fstec
больше 15 лет назад

Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 81%
0.01631
Низкий

7.5 High

CVSS2