Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.61447
Kategorie:FreeBSD Local Security Checks
Titel:FreeBSD Ports: gnutls
Zusammenfassung:The remote host is missing an update to the system; as announced in the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following package is affected: gnutls

CVE-2008-2377
Use after free vulnerability in the
_gnutls_handshake_hash_buffers_clear function in
lib/gnutls_handshake.c in libgnutls in GnuTLS 2.3.5 through 2.4.0
allows remote attackers to cause a denial of service (crash) or
possibly execute arbitrary code via TLS transmission of data that is
improperly used when the peer calls gnutls_handshake within a normal
session, leading to attempted access to a deallocated libgcrypt
handle.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
7.6

CVSS Vector:
AV:N/AC:H/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2008-2377
30713
http://www.securityfocus.com/bid/30713
31505
http://secunia.com/advisories/31505
ADV-2008-2398
http://www.vupen.com/english/advisories/2008/2398
[gnutls-devel] 20080630 Details on the gnutls_handshake local crash problem [GNUTLS-SA-2008-2]
http://www.nabble.com/Details-on-the-gnutls_handshake-local-crash-problem--GNUTLS-SA-2008-2--td18205022.html
[gnutls-devel] 20080630 GnuTLS 2.4.1
http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/2947
gnutls-gnutlshandshake-code-execution(44486)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44486
http://www.gnu.org/software/gnutls/security.html
https://issues.rpath.com/browse/RPL-2650
CopyrightCopyright (C) 2008 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.