ALAS-2014-352 ---- gnutlsID: oval:org.secpod.oval:def:1600120 | Date: (C)2016-01-07 (M)2024-02-19 |
Class: PATCH | Family: unix |
A flaw was found in the way GnuTLS parsed session IDs from ServerHello messages of the TLS/SSL handshake. A malicious server could use this flaw to send an excessively long session ID value, which would trigger a buffer overflow in a connecting TLS/SSL client application using GnuTLS, causing the client application to crash or, possibly, execute arbitrary code
Platform: |
Amazon Linux AMI |