Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record with an invalid Record Length, which leads to an invalid cipher padding length, aka GNUTLS-SA-2008-1-3.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2008-05-21T10:00:00
Updated: 2024-08-07T08:41:00.178Z
Reserved: 2008-04-24T00:00:00
Link: CVE-2008-1950
Vulnrichment
No data.
NVD
Status : Modified
Published: 2008-05-21T13:24:00.000
Modified: 2024-11-21T00:45:44.343
Link: CVE-2008-1950
Redhat