fkie_cve-2014-8564
Vulnerability from fkie_nvd
Published
2014-11-13 21:32
Modified
2025-04-12 10:46
Severity ?
Summary
The _gnutls_ecc_ansi_x963_export function in gnutls_ecc.c in GnuTLS 3.x before 3.1.28, 3.2.x before 3.2.20, and 3.3.x before 3.3.10 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) Elliptic Curve Cryptography (ECC) certificate or (2) certificate signing requests (CSR), related to generating key IDs.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EC43DD1B-D8F0-4CC6-A5A9-C0DCEB1A7131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8150D656-9B13-49D0-9960-4C78E057AB26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9C048B6A-5AB2-4363-8FE1-88D3F627E1BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "ABA62CAC-C88C-44E5-A611-366F9AD5FB11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B53405BD-AC8E-4106-9D21-BCD5815E7ECA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0161F845-C5F4-4318-949A-499A4062FB78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DBCACBF9-CE33-4F10-8CFC-84F24CC33476",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C42F577F-264C-4F8F-955A-67743965AB8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9000897D-502D-46E3-95A0-FBCEBB0ED5C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "E53BBB9E-3A38-478E-BE88-E5C83E0C9ED8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C1B8EDFF-5683-4171-BA76-9B26CAE19FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "022F28CD-4D6B-48AB-8E39-244E19D34F67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "16B5986E-1029-4D40-8012-1FF1615C929A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "45439989-0D3B-4DCE-AB35-B63B1543CD59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "BBCD4F3C-8BD4-4367-B00C-A1379C158625",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "12F2CFB7-5ACF-4328-B0F8-C3A981CAA368",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "CC3A72EF-FB1C-4CD8-B6C7-B7D60D6A14D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "14624E40-3CAA-45E5-BDF2-F08706FC68BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "E743ABC3-6F24-43E1-98E5-6F60BE975212",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "0BDA000C-A616-402B-B964-D5F4ADB6B550",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "62789464-0074-4009-B97B-665A21E0CC25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "4B02B1BA-4E05-4AFD-B1F8-1CB54F2DC5B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "95A77487-3ABD-40F5-9C98-49A65ED7F16D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "3911F202-5E7B-4DE3-90D9-07278923036B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.23:*:*:*:*:*:*:*",
"matchCriteriaId": "4CF1B6CF-3434-4874-9324-87D045511A13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.24:*:*:*:*:*:*:*",
"matchCriteriaId": "133CA307-1B3A-4DBB-89F8-C780E4B1BA7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.25:*:*:*:*:*:*:*",
"matchCriteriaId": "48CD2EAB-A10E-4C91-9D00-9F98BD63CA1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.26:*:*:*:*:*:*:*",
"matchCriteriaId": "F97BE4C9-E7FC-44FE-9F11-7776BCD6E81F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.27:*:*:*:*:*:*:*",
"matchCriteriaId": "D97EAF12-679B-4494-871F-0074ABD0E20B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.0.28:*:*:*:*:*:*:*",
"matchCriteriaId": "70F58963-0C56-4228-B9DC-1EA54DA8070D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D91451B0-301B-430D-9D77-00F4AE91C10A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6917AC57-F49D-4EFC-920C-CCAFDF6174B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E7ACCE21-A19D-4BE5-9BED-30C5A7418719",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "344CCDAD-64EC-419C-995B-51F922AB9E39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "49DB8FC4-F84A-47FD-9586-CF02761152A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A1B43AF4-E52B-46EA-81CF-D4DCAE82E7DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D57BDDEB-090D-472C-9FB6-4555429860E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6CB23D13-94D2-4FAE-AB76-8574E35E02AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D45B0F5E-B4E1-471E-8CDD-85E09837839F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F430F4C6-A738-4E02-BE76-041F71335E62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F272E2DC-7E54-4034-B7BA-30966D57CDFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "64EE97BB-D0EE-444A-96FA-D127892216F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "FB28F388-DE19-4C25-A838-949CA926C31A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "33DCAA09-7E8C-4C3E-901F-641681AA9E3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "435C588C-A478-4FB8-A47D-2605CB39C331",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "9EDDABF3-ECA6-433E-A7D6-8E13F0C6433B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "0142E0D7-85DD-413B-B176-2FB5E12C2FE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "780D6C0C-2B20-425E-B15E-EE1AF9F28B31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "DC2D3896-E095-4889-A9D1-6D8EB2882D64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "C3CCDF3A-BEAB-4DA2-A15A-A855FFFD415A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "425F7D5B-EE8A-46EC-B986-414FB90702C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "9BC83E92-882B-4984-80FC-FAB7F5CD52E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "8AFAAACF-FD4A-4B1C-A35A-E11189DE2F85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.23:*:*:*:*:*:*:*",
"matchCriteriaId": "A62B585C-2FC8-448F-97E7-CAC59548B03A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "07815863-DBCF-41E9-A459-9CE57B74E489",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.25:*:*:*:*:*:*:*",
"matchCriteriaId": "F826F2B5-F00A-44FE-9229-B4597017DE9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "A4E4F6F8-80F3-433D-B702-9DEF6D375A64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.1.27:*:*:*:*:*:*:*",
"matchCriteriaId": "1BE75031-0B8B-44A7-B541-F395BE7AF473",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "827A375E-8045-4A81-AB7C-11A89E862518",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC1076D-2249-406B-9D43-B24764BBE007",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F039CD91-0FF6-4640-B981-20A3F9384A1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8008DADD-DB6C-4C67-B333-0DC4C7152B2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BC9E811B-4EED-4B6A-8836-5405F7F5A53D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "567E66B1-53D9-4A80-A938-2FE5C7CEB985",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AA2186BE-288F-40FD-B634-76D14578E252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "773043EA-8C41-4F42-9702-660FD6822FD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "37E05061-D666-492E-AF2B-CF30FC2FA759",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.2.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A22BC2E4-A2A5-4637-A9B9-9E68FC982BC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "68DF059C-4C1D-4B9C-993E-1C4D3510471C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "8E9A21B6-4A22-4801-8023-45F39EC02576",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2EA5F76C-3524-4E80-985F-FC74DD20B5E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "FCB890F0-3126-4FDD-8162-AC28754D3D05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.2.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "35CAA298-D755-4668-A568-439532DF7A0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "13B53422-C666-4140-BF8A-EEDB8AC95A70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "E6B1861D-61C3-469E-B37F-B76758626BCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "07517D8A-C31B-4F4E-87A0-3239F88015DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "1736E9EB-AC26-44D7-99EB-99CC1F596CB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "E94E55DE-7CCB-4C91-BBB3-9D11FF5F9440",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "E03D0521-C985-4A2C-A848-43BE614F9113",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "9AFBDD69-430C-4312-8B28-4A51FB4BC8D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.3.0:-:*:*:*:*:*:*",
"matchCriteriaId": "BE31FE31-3F85-41F3-9DCB-58A090E63DEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.3.0:pre0:*:*:*:*:*:*",
"matchCriteriaId": "18A0842D-2CAC-4372-80D0-68BCCC28C7BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A91948CE-E418-4450-AB62-9078D3A0FBEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D34267DC-A768-4A0F-BB54-74314B70E4F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "160B3AD7-37A3-4A01-B1CD-83E6500E145A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BCE61F19-A2C3-4FE9-9C5A-D1FB949B6CEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5EDFE7E2-12FC-4819-8615-F76A312E8BEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4993D25F-607B-4486-B9EC-566A1EEBE73B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9FEF4D26-DD0C-4E67-8901-8B38A51C1FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "49CE4BAE-77EC-469D-9FE2-A807B7E2EC64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:3.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "7921C926-450B-4EFF-B610-B8B8FD17AE1A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3C84489B-B08C-4854-8A12-D01B6E45CF79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The _gnutls_ecc_ansi_x963_export function in gnutls_ecc.c in GnuTLS 3.x before 3.1.28, 3.2.x before 3.2.20, and 3.3.x before 3.3.10 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) Elliptic Curve Cryptography (ECC) certificate or (2) certificate signing requests (CSR), related to generating key IDs."
},
{
"lang": "es",
"value": "La funci\u00f3n _gnutls_ecc_ansi_x963_export en gnutls_ecc.c en GnuTLS 3.x anterior a 3.1.28, 3.2.x anterior a 3.2.20, y 3.3.x anterior a 3.3.10 permite a atacantes remotos causar una denegaci\u00f3n de servicio (escritura fuera de rango) a trav\u00e9s de un certificado malicioso ECC de tipo (1) curva el\u00edptica criptogr\u00e1fica o (2) peticiones de solicitudes de firma de certificado (CSR), relacionado con la generaci\u00f3n de key IDs."
}
],
"id": "CVE-2014-8564",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-11-13T21:32:13.427",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00084.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1846.html"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/59991"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/62284"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/62294"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2403-1"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161443"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00084.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1846.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/59991"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62284"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62294"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2403-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161443"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-310"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…