Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.61447
Categoría:FreeBSD Local Security Checks
Título:FreeBSD Ports: gnutls
Resumen:The remote host is missing an update to the system; as announced in the referenced advisory.
Descripción:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following package is affected: gnutls

CVE-2008-2377
Use after free vulnerability in the
_gnutls_handshake_hash_buffers_clear function in
lib/gnutls_handshake.c in libgnutls in GnuTLS 2.3.5 through 2.4.0
allows remote attackers to cause a denial of service (crash) or
possibly execute arbitrary code via TLS transmission of data that is
improperly used when the peer calls gnutls_handshake within a normal
session, leading to attempted access to a deallocated libgcrypt
handle.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
7.6

CVSS Vector:
AV:N/AC:H/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2008-2377
30713
http://www.securityfocus.com/bid/30713
31505
http://secunia.com/advisories/31505
ADV-2008-2398
http://www.vupen.com/english/advisories/2008/2398
[gnutls-devel] 20080630 Details on the gnutls_handshake local crash problem [GNUTLS-SA-2008-2]
http://www.nabble.com/Details-on-the-gnutls_handshake-local-crash-problem--GNUTLS-SA-2008-2--td18205022.html
[gnutls-devel] 20080630 GnuTLS 2.4.1
http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/2947
gnutls-gnutlshandshake-code-execution(44486)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44486
http://www.gnu.org/software/gnutls/security.html
https://issues.rpath.com/browse/RPL-2650
CopyrightCopyright (C) 2008 E-Soft Inc.

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.