Page 5 of 43 results (0.006 seconds)

CVSS: 7.5EPSS: 9%CPEs: 105EXPL: 0

21 May 2008 — Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record with an invalid Record Length, which leads to an invalid cipher padding length, aka GNUTLS-SA-2008-1-3. Error en signo de entero de la función the _gnutls_ciphertext2compressed en lib/gnutls_ciph... • http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba=commitdiff%3Bh=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b • CWE-189: Numeric Errors •

CVSS: 9.1EPSS: 6%CPEs: 40EXPL: 0

14 Sep 2006 — verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents GnuTLS from correctly verifying X.509 and other certificates that use PKCS, a variant of CVE-2006-4339. verify.c en GnuTLS anterior a 1.4.4, cuando usamos una llave RSA con exponente 3, no maneja correctamente el exceso de datos en... • http://lists.gnupg.org/pipermail/gnutls-dev/2006-September/001205.html •

CVSS: 7.5EPSS: 2%CPEs: 10EXPL: 0

03 May 2005 — The "record packet parsing" in GnuTLS 1.2 before 1.2.3 and 1.0 before 1.0.25 allows remote attackers to cause a denial of service, possibly related to padding bytes in gnutils_cipher.c. • http://lists.gnupg.org/pipermail/gnutls-dev/2005-April/000858.html •