Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record with an invalid Record Length, which leads to an invalid cipher padding length, aka GNUTLS-SA-2008-1-3.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
Information
                Published : 2008-05-21 06:24
Updated : 2018-10-11 13:38
NVD link : CVE-2008-1950
Mitre link : CVE-2008-1950
JSON object : View
CWE
                
                    
                        
                        CWE-189
                        
            Numeric Errors
Products Affected
                gnu
- gnutls


