Use-after-free vulnerability in the _gnutls_handshake_hash_buffers_clear function in lib/gnutls_handshake.c in libgnutls in GnuTLS 2.3.5 through 2.4.0 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via TLS transmission of data that is improperly used when the peer calls gnutls_handshake within a normal session, leading to attempted access to a deallocated libgcrypt handle.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/2947 - Patch | |
References | () http://secunia.com/advisories/31505 - | |
References | () http://www.gnu.org/software/gnutls/security.html - | |
References | () http://www.nabble.com/Details-on-the-gnutls_handshake-local-crash-problem--GNUTLS-SA-2008-2--td18205022.html - Exploit | |
References | () http://www.securityfocus.com/bid/30713 - | |
References | () http://www.vupen.com/english/advisories/2008/2398 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/44486 - | |
References | () https://issues.rpath.com/browse/RPL-2650 - |
Information
Published : 2008-08-08 19:41
Updated : 2024-11-21 00:46
NVD link : CVE-2008-2377
Mitre link : CVE-2008-2377
CVE.ORG link : CVE-2008-2377
JSON object : View
Products Affected
gnu
- gnutls
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer