Vulnerabilities > GNU > Gnutls > High

DATE CVE VULNERABILITY TITLE RISK
2017-03-24 CVE-2017-5336 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
network
low complexity
opensuse gnu CWE-119
7.5
2017-03-24 CVE-2017-5334 Double Free vulnerability in multiple products
Double free vulnerability in the gnutls_x509_ext_import_proxy function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via crafted policy language information in an X.509 certificate with a Proxy Certificate Information extension.
network
low complexity
opensuse gnu CWE-415
7.5
2015-09-02 CVE-2015-3308 Denial of Service vulnerability in GnuTLS 'x509_ext.c' Use After Free
Double free vulnerability in lib/x509/x509_ext.c in GnuTLS before 3.3.14 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted CRL distribution point.
network
low complexity
gnu canonical
7.5
2014-06-05 CVE-2014-3468 Incorrect Calculation of Buffer Size vulnerability in multiple products
The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.
network
low complexity
gnu redhat debian suse f5 CWE-131
7.5
2012-03-13 CVE-2012-1663 Resource Management Errors vulnerability in GNU Gnutls
Double free vulnerability in libgnutls in GnuTLS before 3.0.14 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted certificate list.
network
low complexity
gnu CWE-399
7.5
2010-03-26 CVE-2010-0731 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in GNU Gnutls
The gnutls_x509_crt_get_serial function in the GnuTLS library before 1.2.1, when running on big-endian, 64-bit platforms, calls the asn1_read_value with a pointer to the wrong data type and the wrong length value, which allows remote attackers to bypass the certificate revocation list (CRL) check and cause a stack-based buffer overflow via a crafted X.509 certificate, related to extraction of a serial number.
network
low complexity
gnu CWE-119
7.5
2009-08-12 CVE-2009-2730 Cryptographic Issues vulnerability in GNU Gnutls
libgnutls in GnuTLS before 2.8.2 does not properly handle a '\0' character in a domain name in the subject's (1) Common Name (CN) or (2) Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
network
low complexity
gnu CWE-310
7.5
2009-04-30 CVE-2009-1416 Cryptographic Issues vulnerability in GNU Gnutls
lib/gnutls_pk.c in libgnutls in GnuTLS 2.5.0 through 2.6.5 generates RSA keys stored in DSA structures, instead of the intended DSA keys, which might allow remote attackers to spoof signatures on certificates or have unspecified other impact by leveraging an invalid DSA key.
network
low complexity
gnu CWE-310
7.5
2008-08-08 CVE-2008-2377 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in GNU Gnutls
Use-after-free vulnerability in the _gnutls_handshake_hash_buffers_clear function in lib/gnutls_handshake.c in libgnutls in GnuTLS 2.3.5 through 2.4.0 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via TLS transmission of data that is improperly used when the peer calls gnutls_handshake within a normal session, leading to attempted access to a deallocated libgcrypt handle.
network
high complexity
gnu CWE-119
7.6
2004-12-31 CVE-2004-2531 Denial Of Service vulnerability in GNU Gnutls 1.0.16
X.509 Certificate Signature Verification in Gnu transport layer security library (GnuTLS) 1.0.16 allows remote attackers to cause a denial of service (CPU consumption) via certificates containing long chains and signed with large RSA keys.
network
low complexity
gnu
7.8