[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1581 gnutls13 -- several vulnerabilities

ID: oval:org.mitre.oval:def:7887Date: (C)2009-12-15   (M)2023-11-13
Class: PATCHFamily: unix




Several remote vulnerabilities have been discovered in GNUTLS, an implementation of the SSL/TLS protocol suite. NOTE: The libgnutls13 package, which provides the GNUTLS library, does not contain logic to automatically restart potentially affected services. You must restart affected services manually (mainly Exim, using /etc/init.d/exim4 restart) after applying the update, to make the changes fully effective. Alternatively, you can reboot the system. The Common Vulnerabilities and Exposures project identifies the following problems: A pre-authentication heap overflow involving oversized session resumption data may lead to arbitrary code execution. Repeated client hellos may result in a pre-authentication denial of service condition due to a null pointer dereference. Decoding cipher padding with an invalid record length may cause GNUTLS to read memory beyond the end of the received record, leading to a pre-authentication denial of service condition.

Platform:
Debian 4.0
Product:
gnutls13
Reference:
DSA-1581
CVE-2008-1948
CVE-2008-1949
CVE-2008-1950
CVE    3
CVE-2008-1950
CVE-2008-1949
CVE-2008-1948
CPE    1
cpe:/o:debian:debian_linux:4.x

© SecPod Technologies