Lucene search

K
GnuGnutls

5 matches found

CVE
CVE
added 2013/02/08 7:55 p.m.107 views

CVE-2013-1619

The TLS implementation in GnuTLS before 2.12.23, 3.0.x before 3.0.28, and 3.1.x before 3.1.7 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks a...

4CVSS6.8AI score0.01291EPSS
CVE
CVE
added 2015/08/14 6:59 p.m.86 views

CVE-2014-8155

GnuTLS before 2.9.10 does not verify the activation and expiration dates of CA certificates, which allows man-in-the-middle attackers to spoof servers via a certificate issued by a CA certificate that is (1) not yet valid or (2) no longer valid.

4.3CVSS7.1AI score0.00286EPSS
CVE
CVE
added 2011/12/08 8:55 p.m.69 views

CVE-2011-4128

Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to cause a denial of service (application crash) via a large SessionTic...

4.3CVSS8.1AI score0.01319EPSS
CVE
CVE
added 2012/01/06 1:55 a.m.69 views

CVE-2012-0390

The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain error-handling code only if there is a specific relationship between a padding length and the ciphertext size, which makes it easier for remote attackers to recover partial plaintext via a timing side-channel attack, a related is...

4.3CVSS8.4AI score0.01154EPSS
CVE
CVE
added 2009/04/30 8:30 p.m.49 views

CVE-2009-1415

lib/pk-libgcrypt.c in libgnutls in GnuTLS before 2.6.6 does not properly handle invalid DSA signatures, which allows remote attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a malformed DSA key that triggers a (1) free of an uninitialized poin...

4.3CVSS7AI score0.17762EPSS