Lucene search

K
cve[email protected]CVE-2008-1948
HistoryMay 21, 2008 - 1:24 p.m.

CVE-2008-1948

2008-05-2113:24:00
CWE-189
web.nvd.nist.gov
35
gnutls
gnutls-serv
gnutls
buffer overflow
denial of service
nvd
cve-2008-1948
session resumption data
security vulnerability

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

8 High

AI Score

Confidence

Low

0.084 Low

EPSS

Percentile

94.4%

The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a zero value for the length of Server Names, which leads to a buffer overflow in session resumption data in the pack_security_parameters function, aka GNUTLS-SA-2008-1-1.

Affected configurations

NVD
Node
gnugnutlsMatch1.0.18
OR
gnugnutlsMatch1.0.19
OR
gnugnutlsMatch1.0.20
OR
gnugnutlsMatch1.0.21
OR
gnugnutlsMatch1.0.22
OR
gnugnutlsMatch1.0.23
OR
gnugnutlsMatch1.0.24
OR
gnugnutlsMatch1.0.25
OR
gnugnutlsMatch1.1.13
OR
gnugnutlsMatch1.1.14
OR
gnugnutlsMatch1.1.15
OR
gnugnutlsMatch1.1.16
OR
gnugnutlsMatch1.1.17
OR
gnugnutlsMatch1.1.18
OR
gnugnutlsMatch1.1.19
OR
gnugnutlsMatch1.1.20
OR
gnugnutlsMatch1.1.21
OR
gnugnutlsMatch1.1.22
OR
gnugnutlsMatch1.1.23
OR
gnugnutlsMatch1.2.0
OR
gnugnutlsMatch1.2.1
OR
gnugnutlsMatch1.2.2
OR
gnugnutlsMatch1.2.3
OR
gnugnutlsMatch1.2.4
OR
gnugnutlsMatch1.2.5
OR
gnugnutlsMatch1.2.6
OR
gnugnutlsMatch1.2.7
OR
gnugnutlsMatch1.2.8
OR
gnugnutlsMatch1.2.9
OR
gnugnutlsMatch1.2.10
OR
gnugnutlsMatch1.2.11
OR
gnugnutlsMatch1.3.0
OR
gnugnutlsMatch1.3.1
OR
gnugnutlsMatch1.3.2
OR
gnugnutlsMatch1.3.3
OR
gnugnutlsMatch1.3.4
OR
gnugnutlsMatch1.3.5
OR
gnugnutlsMatch1.4.0
OR
gnugnutlsMatch1.4.1
OR
gnugnutlsMatch1.4.2
OR
gnugnutlsMatch1.4.3
OR
gnugnutlsMatch1.4.4
OR
gnugnutlsMatch1.4.5
OR
gnugnutlsMatch1.5.0
OR
gnugnutlsMatch1.5.1
OR
gnugnutlsMatch1.5.2
OR
gnugnutlsMatch1.5.3
OR
gnugnutlsMatch1.5.4
OR
gnugnutlsMatch1.5.5
OR
gnugnutlsMatch1.6.0
OR
gnugnutlsMatch1.6.1
OR
gnugnutlsMatch1.6.2
OR
gnugnutlsMatch1.6.3
OR
gnugnutlsMatch1.7.0
OR
gnugnutlsMatch1.7.1
OR
gnugnutlsMatch1.7.2
OR
gnugnutlsMatch1.7.3
OR
gnugnutlsMatch1.7.4
OR
gnugnutlsMatch1.7.5
OR
gnugnutlsMatch1.7.6
OR
gnugnutlsMatch1.7.7
OR
gnugnutlsMatch1.7.8
OR
gnugnutlsMatch1.7.9
OR
gnugnutlsMatch1.7.10
OR
gnugnutlsMatch1.7.11
OR
gnugnutlsMatch1.7.12
OR
gnugnutlsMatch1.7.13
OR
gnugnutlsMatch1.7.14
OR
gnugnutlsMatch1.7.15
OR
gnugnutlsMatch1.7.16
OR
gnugnutlsMatch1.7.17
OR
gnugnutlsMatch1.7.18
OR
gnugnutlsMatch1.7.19
OR
gnugnutlsMatch2.0.0
OR
gnugnutlsMatch2.0.1
OR
gnugnutlsMatch2.0.2
OR
gnugnutlsMatch2.0.3
OR
gnugnutlsMatch2.0.4
OR
gnugnutlsMatch2.1.0
OR
gnugnutlsMatch2.1.1
OR
gnugnutlsMatch2.1.2
OR
gnugnutlsMatch2.1.3
OR
gnugnutlsMatch2.1.4
OR
gnugnutlsMatch2.1.5
OR
gnugnutlsMatch2.1.6
OR
gnugnutlsMatch2.1.7
OR
gnugnutlsMatch2.1.8
OR
gnugnutlsMatch2.2.0
OR
gnugnutlsMatch2.2.1
OR
gnugnutlsMatch2.2.2
OR
gnugnutlsMatch2.2.3
OR
gnugnutlsMatch2.2.4
OR
gnugnutlsMatch2.2.5
OR
gnugnutlsMatch2.3.0
OR
gnugnutlsMatch2.3.1
OR
gnugnutlsMatch2.3.2
OR
gnugnutlsMatch2.3.3
OR
gnugnutlsMatch2.3.4
OR
gnugnutlsMatch2.3.5
OR
gnugnutlsMatch2.3.6
OR
gnugnutlsMatch2.3.7
OR
gnugnutlsMatch2.3.8
OR
gnugnutlsMatch2.3.9
OR
gnugnutlsMatch2.3.10
OR
gnugnutlsMatch2.3.11

References

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

8 High

AI Score

Confidence

Low

0.084 Low

EPSS

Percentile

94.4%