Max CVSS | 7.6 | Min CVSS | 4.3 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2008-4989 | 4.3 |
The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS before 2.6.1 trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate, which allows man-in-the-middle attackers t
|
09-02-2024 - 03:19 | 13-11-2008 - 01:00 | |
CVE-2006-7239 | 5.0 |
The _gnutls_x509_oid2mac_algorithm function in lib/gnutls_algorithms.c in GnuTLS before 1.4.2 allows remote attackers to cause a denial of service (crash) via a crafted X.509 certificate that uses a hash algorithm that is not supported by GnuTLS, whi
|
13-02-2023 - 02:17 | 24-05-2010 - 19:30 | |
CVE-2012-1573 | 5.0 |
gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a c
|
18-01-2018 - 02:29 | 26-03-2012 - 19:55 | |
CVE-2012-1569 | 5.0 |
The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap mem
|
18-01-2018 - 02:29 | 26-03-2012 - 19:55 | |
CVE-2011-4128 | 4.3 |
Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to cause a denial of s
|
29-12-2017 - 02:29 | 08-12-2011 - 20:55 | |
CVE-2006-4790 | 5.0 |
verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signe
|
11-10-2017 - 01:31 | 14-09-2006 - 19:07 | |
CVE-2008-2377 | 7.6 |
Use-after-free vulnerability in the _gnutls_handshake_hash_buffers_clear function in lib/gnutls_handshake.c in libgnutls in GnuTLS 2.3.5 through 2.4.0 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via
|
08-08-2017 - 01:30 | 08-08-2008 - 19:41 |