Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record with an invalid Record Length, which leads to an invalid cipher padding length, aka GNUTLS-SA-2008-1-3.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2008-05-21 06:24
Updated : 2018-10-11 13:38
NVD link : CVE-2008-1950
Mitre link : CVE-2008-1950
JSON object : View
CWE
CWE-189
Numeric Errors
Products Affected
gnu
- gnutls