Description
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record with an invalid Record Length, which leads to an invalid cipher padding length, aka GNUTLS-SA-2008-1-3.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1581-1 | New gnutls13 packages fix potential code execution |
Ubuntu USN |
USN-613-1 | GnuTLS vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T08:41:00.178Z
Reserved: 2008-04-24T00:00:00.000Z
Link: CVE-2008-1950
No data.
Status : Modified
Published: 2008-05-21T13:24:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2008-1950
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN