Page 9 of 42 results (0.006 seconds)

CVSS: 5.0EPSS: 4%CPEs: 40EXPL: 0

verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents GnuTLS from correctly verifying X.509 and other certificates that use PKCS, a variant of CVE-2006-4339. verify.c en GnuTLS anterior a 1.4.4, cuando usamos una llave RSA con exponente 3, no maneja correctamente el exceso de datos en el campo digestAlgorithm.parameters al generar un hash, el cual permite a un atacante remoto falsificar una firma PKCS #1 v1.5 que es firmada por esa llave RSA y evita que GnuTLS verifique correctamente X.509 y otros certificados que utilicen PKCS, es una variante de CVE-2006-4339. • http://lists.gnupg.org/pipermail/gnutls-dev/2006-September/001205.html http://lists.gnupg.org/pipermail/gnutls-dev/2006-September/001212.html http://secunia.com/advisories/21937 http://secunia.com/advisories/21942 http://secunia.com/advisories/21973 http://secunia.com/advisories/22049 http://secunia.com/advisories/22080 http://secunia.com/advisories/22084 http://secunia.com/advisories/22097 http://secunia.com/advisories/22226 http://secunia.com/advisories/22992 http://secunia&# •

CVSS: 5.0EPSS: 2%CPEs: 10EXPL: 0

The "record packet parsing" in GnuTLS 1.2 before 1.2.3 and 1.0 before 1.0.25 allows remote attackers to cause a denial of service, possibly related to padding bytes in gnutils_cipher.c. • http://lists.gnupg.org/pipermail/gnutls-dev/2005-April/000858.html http://secunia.com/advisories/15193 http://securitytracker.com/id?1013861 http://www.osvdb.org/16054 http://www.redhat.com/support/errata/RHSA-2005-430.html http://www.securityfocus.com/bid/13477 https://exchange.xforce.ibmcloud.com/vulnerabilities/20328 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9238 https://access.redhat.com/security/cve/CVE-2005-1431 https://bugzilla.re •