Page 6 of 53 results (0.010 seconds)

CVSS: 9.1EPSS: 6%CPEs: 40EXPL: 0

14 Sep 2006 — verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents GnuTLS from correctly verifying X.509 and other certificates that use PKCS, a variant of CVE-2006-4339. verify.c en GnuTLS anterior a 1.4.4, cuando usamos una llave RSA con exponente 3, no maneja correctamente el exceso de datos en... • http://lists.gnupg.org/pipermail/gnutls-dev/2006-September/001205.html •

CVSS: 7.5EPSS: 2%CPEs: 10EXPL: 0

03 May 2005 — The "record packet parsing" in GnuTLS 1.2 before 1.2.3 and 1.0 before 1.0.25 allows remote attackers to cause a denial of service, possibly related to padding bytes in gnutils_cipher.c. • http://lists.gnupg.org/pipermail/gnutls-dev/2005-April/000858.html •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 0

31 Dec 2004 — X.509 Certificate Signature Verification in Gnu transport layer security library (GnuTLS) 1.0.16 allows remote attackers to cause a denial of service (CPU consumption) via certificates containing long chains and signed with large RSA keys. • http://lists.gnupg.org/pipermail/gnutls-dev/2004-August/000703.html •