Description
The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a zero value for the length of Server Names, which leads to a buffer overflow in session resumption data in the pack_security_parameters function, aka GNUTLS-SA-2008-1-1.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1581-1 | New gnutls13 packages fix potential code execution |
Ubuntu USN |
USN-613-1 | GnuTLS vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T08:41:00.219Z
Reserved: 2008-04-24T00:00:00.000Z
Link: CVE-2008-1948
No data.
Status : Modified
Published: 2008-05-21T13:24:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2008-1948
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN