Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2008-1950

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-21 May, 2008 | 10:00
Updated At-07 Aug, 2024 | 08:41
Rejected At-
Credits

Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record with an invalid Record Length, which leads to an invalid cipher padding length, aka GNUTLS-SA-2008-1-3.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:21 May, 2008 | 10:00
Updated At:07 Aug, 2024 | 08:41
Rejected At:
▼CVE Numbering Authority (CNA)

Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record with an invalid Record Length, which leads to an invalid cipher padding length, aka GNUTLS-SA-2008-1-3.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/30331
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31939
third-party-advisory
x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-613-1
vendor-advisory
x_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00003.html
vendor-advisory
x_refsource_SUSE
http://www.redhat.com/support/errata/RHSA-2008-0492.html
vendor-advisory
x_refsource_REDHAT
http://www.openwall.com/lists/oss-security/2008/05/20/1
mailing-list
x_refsource_MLIST
http://security.gentoo.org/glsa/glsa-200805-20.xml
vendor-advisory
x_refsource_GENTOO
http://secunia.com/advisories/30355
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/30317
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/492282/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.redhat.com/support/errata/RHSA-2008-0489.html
vendor-advisory
x_refsource_REDHAT
http://www.securityfocus.com/archive/1/492464/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00051.html
mailing-list
x_refsource_MLIST
http://sourceforge.net/project/shownotes.php?release_id=600646&group_id=21558
x_refsource_CONFIRM
http://secunia.com/advisories/30324
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/30302
third-party-advisory
x_refsource_SECUNIA
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00055.html
mailing-list
x_refsource_MLIST
http://www.vupen.com/english/advisories/2008/1583/references
vdb-entry
x_refsource_VUPEN
http://www.securityfocus.com/bid/29292
vdb-entry
x_refsource_BID
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00615.html
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/30330
third-party-advisory
x_refsource_SECUNIA
http://www.securitytracker.com/id?1020059
vdb-entry
x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2008/1582/references
vdb-entry
x_refsource_VUPEN
http://www.openwall.com/lists/oss-security/2008/05/20/3
mailing-list
x_refsource_MLIST
http://www.kb.cert.org/vuls/id/659209
third-party-advisory
x_refsource_CERT-VN
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0174
x_refsource_CONFIRM
http://secunia.com/advisories/30338
third-party-advisory
x_refsource_SECUNIA
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00060.html
mailing-list
x_refsource_MLIST
http://www.debian.org/security/2008/dsa-1581
vendor-advisory
x_refsource_DEBIAN
http://www.openwall.com/lists/oss-security/2008/05/20/2
mailing-list
x_refsource_MLIST
https://exchange.xforce.ibmcloud.com/vulnerabilities/42533
vdb-entry
x_refsource_XF
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00590.html
vendor-advisory
x_refsource_FEDORA
http://securityreason.com/securityalert/3902
third-party-advisory
x_refsource_SREASON
https://issues.rpath.com/browse/RPL-2552
x_refsource_CONFIRM
http://secunia.com/advisories/30287
third-party-advisory
x_refsource_SECUNIA
http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba=commitdiff%3Bh=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
x_refsource_CONFIRM
http://www.cert.fi/haavoittuvuudet/advisory-gnutls.html
x_refsource_MISC
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00487.html
vendor-advisory
x_refsource_FEDORA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11393
vdb-entry
signature
x_refsource_OVAL
http://www.mandriva.com/security/advisories?name=MDVSA-2008:106
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://secunia.com/advisories/30331
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31939
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ubuntu.com/usn/usn-613-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00003.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0492.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/20/1
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://security.gentoo.org/glsa/glsa-200805-20.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://secunia.com/advisories/30355
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/30317
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/492282/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0489.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.securityfocus.com/archive/1/492464/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00051.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=600646&group_id=21558
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/30324
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/30302
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00055.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.vupen.com/english/advisories/2008/1583/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securityfocus.com/bid/29292
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00615.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/30330
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securitytracker.com/id?1020059
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.vupen.com/english/advisories/2008/1582/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/20/3
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.kb.cert.org/vuls/id/659209
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0174
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/30338
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00060.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.debian.org/security/2008/dsa-1581
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/20/2
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/42533
Resource:
vdb-entry
x_refsource_XF
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00590.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://securityreason.com/securityalert/3902
Resource:
third-party-advisory
x_refsource_SREASON
Hyperlink: https://issues.rpath.com/browse/RPL-2552
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/30287
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba=commitdiff%3Bh=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.cert.fi/haavoittuvuudet/advisory-gnutls.html
Resource:
x_refsource_MISC
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00487.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11393
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:106
Resource:
vendor-advisory
x_refsource_MANDRIVA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/30331
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31939
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ubuntu.com/usn/usn-613-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00003.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0492.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.openwall.com/lists/oss-security/2008/05/20/1
mailing-list
x_refsource_MLIST
x_transferred
http://security.gentoo.org/glsa/glsa-200805-20.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://secunia.com/advisories/30355
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/30317
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/492282/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0489.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.securityfocus.com/archive/1/492464/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00051.html
mailing-list
x_refsource_MLIST
x_transferred
http://sourceforge.net/project/shownotes.php?release_id=600646&group_id=21558
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/30324
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/30302
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00055.html
mailing-list
x_refsource_MLIST
x_transferred
http://www.vupen.com/english/advisories/2008/1583/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securityfocus.com/bid/29292
vdb-entry
x_refsource_BID
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00615.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/30330
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securitytracker.com/id?1020059
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.vupen.com/english/advisories/2008/1582/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.openwall.com/lists/oss-security/2008/05/20/3
mailing-list
x_refsource_MLIST
x_transferred
http://www.kb.cert.org/vuls/id/659209
third-party-advisory
x_refsource_CERT-VN
x_transferred
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0174
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/30338
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00060.html
mailing-list
x_refsource_MLIST
x_transferred
http://www.debian.org/security/2008/dsa-1581
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.openwall.com/lists/oss-security/2008/05/20/2
mailing-list
x_refsource_MLIST
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/42533
vdb-entry
x_refsource_XF
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00590.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://securityreason.com/securityalert/3902
third-party-advisory
x_refsource_SREASON
x_transferred
https://issues.rpath.com/browse/RPL-2552
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/30287
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba=commitdiff%3Bh=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
x_refsource_CONFIRM
x_transferred
http://www.cert.fi/haavoittuvuudet/advisory-gnutls.html
x_refsource_MISC
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00487.html
vendor-advisory
x_refsource_FEDORA
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11393
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2008:106
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://secunia.com/advisories/30331
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31939
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-613-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00003.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0492.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/20/1
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200805-20.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://secunia.com/advisories/30355
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/30317
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/492282/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0489.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/492464/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00051.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=600646&group_id=21558
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/30324
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/30302
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00055.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/1583/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securityfocus.com/bid/29292
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00615.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/30330
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020059
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/1582/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/20/3
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/659209
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0174
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/30338
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00060.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1581
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/20/2
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/42533
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00590.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://securityreason.com/securityalert/3902
Resource:
third-party-advisory
x_refsource_SREASON
x_transferred
Hyperlink: https://issues.rpath.com/browse/RPL-2552
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/30287
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba=commitdiff%3Bh=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.cert.fi/haavoittuvuudet/advisory-gnutls.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00487.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11393
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:106
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:21 May, 2008 | 13:24
Updated At:07 Nov, 2023 | 02:02

Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record with an invalid Record Length, which leads to an invalid cipher padding length, aka GNUTLS-SA-2008-1-3.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

GNU
gnu
>>gnutls>>1.0.18
cpe:2.3:a:gnu:gnutls:1.0.18:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.0.19
cpe:2.3:a:gnu:gnutls:1.0.19:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.0.20
cpe:2.3:a:gnu:gnutls:1.0.20:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.0.21
cpe:2.3:a:gnu:gnutls:1.0.21:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.0.22
cpe:2.3:a:gnu:gnutls:1.0.22:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.0.23
cpe:2.3:a:gnu:gnutls:1.0.23:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.0.24
cpe:2.3:a:gnu:gnutls:1.0.24:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.0.25
cpe:2.3:a:gnu:gnutls:1.0.25:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.1.13
cpe:2.3:a:gnu:gnutls:1.1.13:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.1.14
cpe:2.3:a:gnu:gnutls:1.1.14:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.1.15
cpe:2.3:a:gnu:gnutls:1.1.15:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.1.16
cpe:2.3:a:gnu:gnutls:1.1.16:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.1.17
cpe:2.3:a:gnu:gnutls:1.1.17:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.1.18
cpe:2.3:a:gnu:gnutls:1.1.18:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.1.19
cpe:2.3:a:gnu:gnutls:1.1.19:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.1.20
cpe:2.3:a:gnu:gnutls:1.1.20:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.1.21
cpe:2.3:a:gnu:gnutls:1.1.21:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.1.22
cpe:2.3:a:gnu:gnutls:1.1.22:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.1.23
cpe:2.3:a:gnu:gnutls:1.1.23:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.0
cpe:2.3:a:gnu:gnutls:1.2.0:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.1
cpe:2.3:a:gnu:gnutls:1.2.1:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.2
cpe:2.3:a:gnu:gnutls:1.2.2:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.3
cpe:2.3:a:gnu:gnutls:1.2.3:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.4
cpe:2.3:a:gnu:gnutls:1.2.4:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.5
cpe:2.3:a:gnu:gnutls:1.2.5:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.6
cpe:2.3:a:gnu:gnutls:1.2.6:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.7
cpe:2.3:a:gnu:gnutls:1.2.7:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.8
cpe:2.3:a:gnu:gnutls:1.2.8:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.9
cpe:2.3:a:gnu:gnutls:1.2.9:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.10
cpe:2.3:a:gnu:gnutls:1.2.10:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.11
cpe:2.3:a:gnu:gnutls:1.2.11:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.3.0
cpe:2.3:a:gnu:gnutls:1.3.0:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.3.1
cpe:2.3:a:gnu:gnutls:1.3.1:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.3.2
cpe:2.3:a:gnu:gnutls:1.3.2:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.3.3
cpe:2.3:a:gnu:gnutls:1.3.3:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.3.4
cpe:2.3:a:gnu:gnutls:1.3.4:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.3.5
cpe:2.3:a:gnu:gnutls:1.3.5:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.4.0
cpe:2.3:a:gnu:gnutls:1.4.0:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.4.1
cpe:2.3:a:gnu:gnutls:1.4.1:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.4.2
cpe:2.3:a:gnu:gnutls:1.4.2:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.4.3
cpe:2.3:a:gnu:gnutls:1.4.3:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.4.4
cpe:2.3:a:gnu:gnutls:1.4.4:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.4.5
cpe:2.3:a:gnu:gnutls:1.4.5:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.5.0
cpe:2.3:a:gnu:gnutls:1.5.0:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.5.1
cpe:2.3:a:gnu:gnutls:1.5.1:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.5.2
cpe:2.3:a:gnu:gnutls:1.5.2:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.5.3
cpe:2.3:a:gnu:gnutls:1.5.3:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.5.4
cpe:2.3:a:gnu:gnutls:1.5.4:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.5.5
cpe:2.3:a:gnu:gnutls:1.5.5:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.6.0
cpe:2.3:a:gnu:gnutls:1.6.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-189Primarynvd@nist.gov
CWE ID: CWE-189
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

The vendor has released a statement regarding this issue: http://lists.gnupg.org/pipermail/gnutls-dev/2006-September/001208.html

Vendor Statements

References
HyperlinkSourceResource
http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba=commitdiff%3Bh=bc8102405fda11ea00ca3b42acc4f4bce9d6e97bsecalert@redhat.com
N/A
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00051.htmlsecalert@redhat.com
Patch
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00055.htmlsecalert@redhat.com
N/A
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00060.htmlsecalert@redhat.com
N/A
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00003.htmlsecalert@redhat.com
N/A
http://secunia.com/advisories/30287secalert@redhat.com
N/A
http://secunia.com/advisories/30302secalert@redhat.com
N/A
http://secunia.com/advisories/30317secalert@redhat.com
N/A
http://secunia.com/advisories/30324secalert@redhat.com
N/A
http://secunia.com/advisories/30330secalert@redhat.com
N/A
http://secunia.com/advisories/30331secalert@redhat.com
N/A
http://secunia.com/advisories/30338secalert@redhat.com
N/A
http://secunia.com/advisories/30355secalert@redhat.com
N/A
http://secunia.com/advisories/31939secalert@redhat.com
N/A
http://security.gentoo.org/glsa/glsa-200805-20.xmlsecalert@redhat.com
N/A
http://securityreason.com/securityalert/3902secalert@redhat.com
N/A
http://sourceforge.net/project/shownotes.php?release_id=600646&group_id=21558secalert@redhat.com
N/A
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0174secalert@redhat.com
N/A
http://www.cert.fi/haavoittuvuudet/advisory-gnutls.htmlsecalert@redhat.com
N/A
http://www.debian.org/security/2008/dsa-1581secalert@redhat.com
N/A
http://www.kb.cert.org/vuls/id/659209secalert@redhat.com
US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2008:106secalert@redhat.com
N/A
http://www.openwall.com/lists/oss-security/2008/05/20/1secalert@redhat.com
N/A
http://www.openwall.com/lists/oss-security/2008/05/20/2secalert@redhat.com
Patch
http://www.openwall.com/lists/oss-security/2008/05/20/3secalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2008-0489.htmlsecalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2008-0492.htmlsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/492282/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/492464/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/29292secalert@redhat.com
N/A
http://www.securitytracker.com/id?1020059secalert@redhat.com
N/A
http://www.ubuntu.com/usn/usn-613-1secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2008/1582/referencessecalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2008/1583/referencessecalert@redhat.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/42533secalert@redhat.com
N/A
https://issues.rpath.com/browse/RPL-2552secalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11393secalert@redhat.com
N/A
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00487.htmlsecalert@redhat.com
N/A
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00590.htmlsecalert@redhat.com
N/A
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00615.htmlsecalert@redhat.com
N/A
Hyperlink: http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba=commitdiff%3Bh=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00051.html
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00055.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00060.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00003.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/30287
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/30302
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/30317
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/30324
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/30330
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/30331
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/30338
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/30355
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/31939
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-200805-20.xml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://securityreason.com/securityalert/3902
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=600646&group_id=21558
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0174
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.cert.fi/haavoittuvuudet/advisory-gnutls.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.debian.org/security/2008/dsa-1581
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.kb.cert.org/vuls/id/659209
Source: secalert@redhat.com
Resource:
US Government Resource
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:106
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/20/1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/20/2
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/20/3
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0489.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0492.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/492282/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/492464/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/29292
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securitytracker.com/id?1020059
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/usn-613-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/1582/references
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/1583/references
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/42533
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://issues.rpath.com/browse/RPL-2552
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11393
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00487.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00590.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00615.html
Source: secalert@redhat.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

173Records found

CVE-2004-0182
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.57% / 67.64%
||
7 Day CHG~0.00%
Published-17 Apr, 2004 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mailman before 2.0.13 allows remote attackers to cause a denial of service (crash) via an email message with an empty subject field.

Action-Not Available
Vendor-n/aGNU
Product-mailmann/a
CVE-2003-0991
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.58% / 80.87%
||
7 Day CHG~0.00%
Published-01 Sep, 2004 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unknown vulnerability in the mail command handler in Mailman before 2.0.14 allows remote attackers to cause a denial of service (crash) via malformed e-mail commands.

Action-Not Available
Vendor-n/aSilicon Graphics, Inc.GNU
Product-propackmailmann/a
CVE-2013-4458
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-1.24% / 78.42%
||
7 Day CHG~0.00%
Published-12 Dec, 2013 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914.

Action-Not Available
Vendor-n/aGNUSUSE
Product-linux_enterprise_serverlinux_enterprise_debuginfoglibcn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2013-1914
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-2.43% / 84.54%
||
7 Day CHG~0.00%
Published-29 Apr, 2013 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results.

Action-Not Available
Vendor-n/aGNU
Product-glibcn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-3829
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-4.07% / 88.09%
||
7 Day CHG~0.00%
Published-27 Mar, 2019 | 17:24
Updated-04 Aug, 2024 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was found in gnutls versions from 3.5.8 before 3.6.7. A memory corruption (double free) vulnerability in the certificate verification API. Any client or server application that verifies X.509 certificates with GnuTLS 3.5.8 or later is affected.

Action-Not Available
Vendor-gnutlsGNUFedora Project
Product-fedoragnutlsgnutls
CWE ID-CWE-416
Use After Free
CWE ID-CWE-415
Double Free
CVE-2012-3404
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-0.60% / 68.62%
||
7 Day CHG~0.00%
Published-10 Feb, 2014 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.12 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (stack corruption and crash) via a format string that uses positional parameters and many format specifiers.

Action-Not Available
Vendor-n/aRed Hat, Inc.GNUCanonical Ltd.
Product-enterprise_linuxglibcubuntu_linuxenterprise_virtualizationn/a
CVE-2012-3405
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-0.67% / 70.34%
||
7 Day CHG~0.00%
Published-10 Feb, 2014 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (segmentation fault and crash) via a format string with a large number of format specifiers that triggers "desynchronization within the buffer size handling," a different vulnerability than CVE-2012-3404.

Action-Not Available
Vendor-n/aRed Hat, Inc.GNUCanonical Ltd.
Product-enterprise_linuxglibcubuntu_linuxenterprise_virtualizationn/a
CVE-1999-0216
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.59% / 68.16%
||
7 Day CHG~0.00%
Published-04 Feb, 2000 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Denial of service of inetd on Linux through SYN and RST packets.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncGNUHP Inc.
Product-linux_kernelhp-uxinetn/a
CVE-2016-6131
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.02% / 76.28%
||
7 Day CHG~0.00%
Published-07 Feb, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The demangler in GNU Libiberty allows remote attackers to cause a denial of service (infinite loop, stack overflow, and crash) via a cycle in the references of remembered mangled types.

Action-Not Available
Vendor-n/aGNU
Product-libibertyn/a
CWE ID-CWE-20
Improper Input Validation
CVE-1999-0016
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-72.57% / 98.71%
||
7 Day CHG~0.00%
Published-29 Sep, 1999 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Land IP denial of service.

Action-Not Available
Vendor-n/aNetBSDCisco Systems, Inc.GNUMicrosoft CorporationSun Microsystems (Oracle Corporation)HP Inc.
Product-winsocknetbsdhp-uxwindows_ntiosinetsunoswindows_95n/a
CVE-2016-6261
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-4.50% / 88.70%
||
7 Day CHG~0.00%
Published-07 Sep, 2016 | 20:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.

Action-Not Available
Vendor-n/aGNUopenSUSECanonical Ltd.
Product-libidnleapubuntu_linuxn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2016-6323
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-1.13% / 77.48%
||
7 Day CHG~0.00%
Published-07 Oct, 2016 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The makecontext function in the GNU C Library (aka glibc or libc6) before 2.25 creates execution contexts incompatible with the unwinder on ARM EABI (32-bit) platforms, which might allow context-dependent attackers to cause a denial of service (hang), as demonstrated by applications compiled using gccgo, related to backtrace generation.

Action-Not Available
Vendor-n/aGNUFedora ProjectopenSUSE
Product-fedoraopensuseglibcn/a
CWE ID-CWE-284
Improper Access Control
CVE-2016-6263
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-4.50% / 88.70%
||
7 Day CHG~0.00%
Published-07 Sep, 2016 | 20:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.

Action-Not Available
Vendor-n/aGNU
Product-libidnn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2019-3836
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.48% / 64.19%
||
7 Day CHG~0.00%
Published-01 Apr, 2019 | 14:16
Updated-04 Aug, 2024 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was discovered in gnutls before version 3.6.7 upstream that there is an uninitialized pointer access in gnutls versions 3.6.3 or later which can be triggered by certain post-handshake messages.

Action-Not Available
Vendor-gnutlsGNUFedora ProjectopenSUSE
Product-fedoragnutlsleapgnutls
CWE ID-CWE-456
Missing Initialization of a Variable
CWE ID-CWE-824
Access of Uninitialized Pointer
CVE-2017-8396
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.38% / 58.64%
||
7 Day CHG~0.00%
Published-01 May, 2017 | 18:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 1 because the existing reloc offset range tests didn't catch small negative offsets less than the size of the reloc field. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.

Action-Not Available
Vendor-n/aGNU
Product-binutilsn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2017-8394
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.38% / 58.71%
||
7 Day CHG~0.00%
Published-01 May, 2017 | 18:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of _bfd_elf_large_com_section. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash.

Action-Not Available
Vendor-n/aGNU
Product-binutilsn/a
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2017-8395
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.47% / 63.69%
||
7 Day CHG~0.00%
Published-01 May, 2017 | 18:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid write of size 8 because of missing a malloc() return-value check to see if memory had actually been allocated in the _bfd_generic_get_section_contents function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash.

Action-Not Available
Vendor-n/aGNU
Product-binutilsn/a
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2017-7869
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.70% / 71.15%
||
7 Day CHG~0.00%
Published-14 Apr, 2017 | 04:30
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10.

Action-Not Available
Vendor-n/aGNU
Product-gnutlsn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2017-7227
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.44% / 62.27%
||
7 Day CHG~0.00%
Published-22 Mar, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l.

Action-Not Available
Vendor-n/aGNU
Product-binutilsn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-7507
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.57% / 67.69%
||
7 Day CHG~0.00%
Published-16 Jun, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GnuTLS version 3.5.12 and earlier is vulnerable to a NULL pointer dereference while decoding a status response TLS extension with valid contents. This could lead to a crash of the GnuTLS server application.

Action-Not Available
Vendor-GnuTLSGNU
Product-gnutlsgnutls
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2016-1234
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-7.5||HIGH
EPSS-1.18% / 77.91%
||
7 Day CHG~0.00%
Published-01 Jun, 2016 | 20:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.

Action-Not Available
Vendor-n/aGNUFedora ProjectopenSUSE
Product-leapfedoraopensuseglibcn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-10326
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.48% / 64.04%
||
7 Day CHG~0.00%
Published-13 Apr, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a heap buffer overflow in the osip_body_to_str() function defined in osipparser2/osip_body.c, resulting in a remote DoS.

Action-Not Available
Vendor-n/aGNU
Product-osipn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-10325
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.48% / 64.04%
||
7 Day CHG~0.00%
Published-13 Apr, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a heap buffer overflow in the _osip_message_to_str() function defined in osipparser2/osip_message_to_str.c, resulting in a remote DoS.

Action-Not Available
Vendor-n/aGNU
Product-osipn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-3326
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.09% / 27.06%
||
7 Day CHG~0.00%
Published-27 Jan, 2021 | 00:00
Updated-09 Jun, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.

Action-Not Available
Vendor-n/aNetApp, Inc.GNUDebian GNU/LinuxFujitsu LimitedOracle Corporation
Product-m10-4scommunications_cloud_native_core_security_edge_protection_proxym12-2sm12-2_firmwarem12-2s_firmwarem10-4s_firmwarem12-2m10-1_firmwarem10-1m12-1_firmwaredebian_linuxe-series_santricity_os_controllerm12-1m10-4glibcm10-4_firmwareontap_select_deploy_administration_utilityn/a
CWE ID-CWE-617
Reachable Assertion
CVE-2018-6952
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-11.05% / 93.17%
||
7 Day CHG~0.00%
Published-13 Feb, 2018 | 19:00
Updated-05 Aug, 2024 | 06:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6.

Action-Not Available
Vendor-n/aGNU
Product-patchn/a
CWE ID-CWE-415
Double Free
CVE-2021-28236
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.43% / 62.00%
||
7 Day CHG~0.00%
Published-02 Dec, 2021 | 21:47
Updated-03 Aug, 2024 | 21:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

LibreDWG v0.12.3 was discovered to contain a NULL pointer dereference via out_dxfb.c.

Action-Not Available
Vendor-n/aGNU
Product-libredwgn/a
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2011-4609
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-0.73% / 71.71%
||
7 Day CHG~0.00%
Published-02 May, 2013 | 14:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The svc_run function in the RPC implementation in glibc before 2.15 allows remote attackers to cause a denial of service (CPU consumption) via a large number of RPC connections.

Action-Not Available
Vendor-n/aGNU
Product-glibcn/a
CVE-2014-9112
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.34% / 79.24%
||
7 Day CHG~0.00%
Published-02 Dec, 2014 | 16:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.

Action-Not Available
Vendor-n/aDebian GNU/LinuxGNU
Product-debian_linuxcpion/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-6003
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.58% / 80.87%
||
7 Day CHG~0.00%
Published-22 Jan, 2018 | 20:00
Updated-05 Aug, 2024 | 05:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS.

Action-Not Available
Vendor-n/aDebian GNU/LinuxGNUFedora Project
Product-debian_linuxlibtasn1fedoran/a
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2004-1702
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-2.12% / 83.42%
||
7 Day CHG~0.00%
Published-21 Feb, 2005 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The AuthenticationDialogue function in cfservd for Cfengine 2.0.0 to 2.1.7p1 does not properly check the return value of the ReceiveTransaction function, which leads to a failed malloc call and triggers to a null dereference, which allows remote attackers to cause a denial of service (crash).

Action-Not Available
Vendor-n/aGNU
Product-cfenginen/a
CVE-2013-4487
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-0.34% / 55.86%
||
7 Day CHG~0.00%
Published-19 Nov, 2013 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Off-by-one error in the dane_raw_tlsa in the DANE library (libdane) in GnuTLS 3.1.x before 3.1.16 and 3.2.x before 3.2.6 allows remote servers to cause a denial of service (memory corruption) via a response with more than four DANE entries. NOTE: this issue is due to an incomplete fix for CVE-2013-4466.

Action-Not Available
Vendor-n/aGNUopenSUSE
Product-gnutlsopensusen/a
CVE-2008-1948
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-10||HIGH
EPSS-23.88% / 95.80%
||
7 Day CHG~0.00%
Published-21 May, 2008 | 10:00
Updated-07 Aug, 2024 | 08:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a zero value for the length of Server Names, which leads to a buffer overflow in session resumption data in the pack_security_parameters function, aka GNUTLS-SA-2008-1-1.

Action-Not Available
Vendor-n/aGNU
Product-gnutlsn/a
CWE ID-CWE-189
Not Available
CVE-2008-1685
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.49% / 64.44%
||
7 Day CHG~0.00%
Published-06 Apr, 2008 | 23:00
Updated-07 Aug, 2024 | 09:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

gcc 4.2.0 through 4.3.0 in GNU Compiler Collection, when casts are not used, considers the sum of a pointer and an int to be greater than or equal to the pointer, which might lead to removal of length testing code that was intended as a protection mechanism against integer overflow and buffer overflow attacks, and provide no diagnostic message about this removal. NOTE: the vendor has determined that this compiler behavior is correct according to section 6.5.6 of the C99 standard (aka ISO/IEC 9899:1999)

Action-Not Available
Vendor-n/aGNU
Product-gccn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-189
Not Available
CVE-2014-10375
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.35% / 56.82%
||
7 Day CHG~0.00%
Published-14 Aug, 2019 | 04:46
Updated-06 Aug, 2024 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header.

Action-Not Available
Vendor-n/aGNU
Product-exosipn/a
CWE ID-CWE-189
Not Available
CVE-2009-4418
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.33% / 55.27%
||
7 Day CHG~0.00%
Published-24 Dec, 2009 | 17:00
Updated-17 Sep, 2024 | 02:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The unserialize function in PHP 5.3.0 and earlier allows context-dependent attackers to cause a denial of service (resource consumption) via a deeply nested serialized variable, as demonstrated by a string beginning with a:1: followed by many {a:1: sequences.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-189
Not Available
CVE-2009-3551
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-0.70% / 71.06%
||
7 Day CHG~0.00%
Published-30 Oct, 2009 | 20:05
Updated-07 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Off-by-one error in the dissect_negprot_response function in packet-smb.c in the SMB dissector in Wireshark 1.2.0 through 1.2.2 allows remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace. NOTE: some of these details are obtained from third party information.

Action-Not Available
Vendor-n/aWireshark Foundation
Product-wiresharkn/a
CWE ID-CWE-189
Not Available
CVE-2009-1959
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-6.92% / 91.03%
||
7 Day CHG~0.00%
Published-06 Jun, 2009 | 18:00
Updated-07 Aug, 2024 | 05:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Off-by-one error in the event_wallops function in fe-common/irc/fe-events.c in irssi 0.8.13 allows remote IRC servers to cause a denial of service (crash) via an empty command, which triggers a one-byte buffer under-read and a one-byte buffer underflow.

Action-Not Available
Vendor-irssin/a
Product-irssin/a
CWE ID-CWE-189
Not Available
CVE-2009-2535
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-10.79% / 93.06%
||
7 Day CHG~0.00%
Published-20 Jul, 2009 | 18:00
Updated-07 Aug, 2024 | 05:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mozilla Firefox before 2.0.0.19 and 3.x before 3.0.5, SeaMonkey, and Thunderbird allow remote attackers to cause a denial of service (memory consumption and application crash) via a large integer value for the length property of a Select object, a related issue to CVE-2009-1692.

Action-Not Available
Vendor-n/aMozilla Corporation
Product-firefoxthunderbirdseamonkeyn/a
CWE ID-CWE-189
Not Available
CVE-2009-1904
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-4.71% / 88.96%
||
7 Day CHG~0.00%
Published-11 Jun, 2009 | 21:00
Updated-07 Aug, 2024 | 05:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The BigDecimal library in Ruby 1.8.6 before p369 and 1.8.7 before p173 allows context-dependent attackers to cause a denial of service (application crash) via a string argument that represents a large number, as demonstrated by an attempted conversion to the Float data type.

Action-Not Available
Vendor-n/aRuby
Product-rubyn/a
CWE ID-CWE-189
Not Available
CVE-2009-2478
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-4.07% / 88.09%
||
7 Day CHG~0.00%
Published-16 Jul, 2009 | 15:00
Updated-07 Aug, 2024 | 05:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mozilla Firefox 3.5 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via unspecified vectors, related to a "flash bug."

Action-Not Available
Vendor-n/aMozilla Corporation
Product-firefoxn/a
CWE ID-CWE-189
Not Available
CVE-2009-1755
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.79% / 81.99%
||
7 Day CHG~0.00%
Published-22 May, 2009 | 01:00
Updated-17 Sep, 2024 | 03:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Off-by-one error in the packet_read_query_section function in packet.c in nsd 3.2.1, and process_query_section in query.c in nsd 2.3.7, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors that trigger a buffer overflow.

Action-Not Available
Vendor-nlnetlabsn/a
Product-nsdn/a
CWE ID-CWE-189
Not Available
CVE-2009-1188
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-11.06% / 93.18%
||
7 Day CHG~0.00%
Published-23 Apr, 2009 | 19:11
Updated-07 Aug, 2024 | 05:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the JBIG2 decoding feature in the SplashBitmap::SplashBitmap function in SplashBitmap.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.10.6, as used in GPdf and kdegraphics KPDF, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document.

Action-Not Available
Vendor-popplern/a
Product-popplern/a
CWE ID-CWE-189
Not Available
CVE-2009-1187
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-26.48% / 96.13%
||
7 Day CHG~0.00%
Published-23 Apr, 2009 | 19:11
Updated-07 Aug, 2024 | 05:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the JBIG2 decoding feature in Poppler before 0.10.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to CairoOutputDev (CairoOutputDev.cc).

Action-Not Available
Vendor-popplern/a
Product-popplern/a
CWE ID-CWE-189
Not Available
CVE-2009-0789
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-3.03% / 86.14%
||
7 Day CHG~0.00%
Published-27 Mar, 2009 | 16:00
Updated-07 Aug, 2024 | 04:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenSSL before 0.9.8k on WIN64 and certain other platforms does not properly handle a malformed ASN.1 structure, which allows remote attackers to cause a denial of service (invalid memory access and application crash) by placing this structure in the public key of a certificate, as demonstrated by an RSA public key.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CWE ID-CWE-189
Not Available
CVE-2009-0192
Matching Score-4
Assigner-Flexera Software LLC
ShareView Details
Matching Score-4
Assigner-Flexera Software LLC
CVSS Score-5||MEDIUM
EPSS-12.57% / 93.70%
||
7 Day CHG~0.00%
Published-14 Jul, 2009 | 20:16
Updated-07 Aug, 2024 | 04:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Off-by-one error in the iMonitor component in Novell eDirectory 8.8 SP3, 8.8 SP3 FTF3, and possibly other versions allows remote attackers to execute arbitrary code via an HTTP request with a crafted Accept-Language header, which triggers a stack-based buffer overflow.

Action-Not Available
Vendor-n/aNovell
Product-edirectoryn/a
CWE ID-CWE-189
Not Available
CVE-2008-6661
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-4.38% / 88.55%
||
7 Day CHG~0.00%
Published-07 Apr, 2009 | 23:00
Updated-07 Aug, 2024 | 11:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple integer overflows in the scanning engine in Bitdefender for Linux 7.60825 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed (1) NeoLite and (2) ASProtect packed PE file.

Action-Not Available
Vendor-n/aBitdefenderLinux Kernel Organization, Inc
Product-bitdefender_antiviruslinux_kerneln/a
CWE ID-CWE-189
Not Available
CVE-2009-4413
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-12.41% / 93.64%
||
7 Day CHG~0.00%
Published-24 Dec, 2009 | 16:00
Updated-07 Aug, 2024 | 07:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The httpClientDiscardBody function in client.c in Polipo 0.9.8, 0.9.12, 1.0.4, and possibly other versions, allows remote attackers to cause a denial of service (crash) via a request with a large Content-Length value, which triggers an integer overflow, a signed-to-unsigned conversion error with a negative value, and a segmentation fault.

Action-Not Available
Vendor-pps.jussieun/a
Product-polipon/a
CWE ID-CWE-189
Not Available
CVE-2009-0794
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-1.88% / 82.40%
||
7 Day CHG~0.00%
Published-13 Apr, 2009 | 16:00
Updated-07 Aug, 2024 | 04:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the PulseAudioTargetDataL class in src/java/org/classpath/icedtea/pulseaudio/PulseAudioTargetDataLine.java in Pulse-Java, as used in OpenJDK 1.6.0.0 and other products, allows remote attackers to cause a denial of service (applet crash) via a crafted Pulse Audio source data line.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)
Product-openjdkn/a
CWE ID-CWE-189
Not Available
CVE-2008-6704
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.40% / 79.68%
||
7 Day CHG~0.00%
Published-10 Apr, 2009 | 15:00
Updated-07 Aug, 2024 | 11:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the NET_Compressor::Decompress function in S.T.A.L.K.E.R.: Shadow of Chernobyl 1.0006 and earlier allows remote attackers to cause a denial of service (server crash) via a crafted packet with a 0xc1 value that contains no compressed data, which triggers a copy of a large amount of memory.

Action-Not Available
Vendor-stalker-gamen/a
Product-s.t.a.l.k.e.r.\n/a
CWE ID-CWE-189
Not Available
CVE-2008-6672
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.19% / 78.00%
||
7 Day CHG~0.00%
Published-08 Apr, 2009 | 10:00
Updated-07 Aug, 2024 | 11:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vertex4 SunAge 1.08.1 and earlier allows remote attackers to cause a denial of service ("runtime error") via a crafted join packet to UDP port 27960, probably related to an invalid nickname command.

Action-Not Available
Vendor-vertex4n/a
Product-sunagen/a
CWE ID-CWE-189
Not Available
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next
Details not found