Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.52985
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2005:430
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory RHSA-2005:430.

The GnuTLS library implements Secure Sockets Layer (SSL v3) and Transport
Layer Security (TLS v1) protocols.

A denial of service bug was found in the GnuTLS library versions prior to
1.0.25. A remote attacker could perform a carefully crafted TLS handshake
against a service that uses the GnuTLS library causing the service to
crash. The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2005-1431 to this issue.

All users of GnuTLS are advised to upgrade to these updated packages and to
restart any services which use GnuTLS.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2005-430.html

Risk factor : Medium

CVSS Score:
5.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-1431
BugTraq ID: 13477
http://www.securityfocus.com/bid/13477
http://lists.gnupg.org/pipermail/gnutls-dev/2005-April/000858.html
http://www.osvdb.org/16054
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9238
http://www.redhat.com/support/errata/RHSA-2005-430.html
http://securitytracker.com/id?1013861
http://secunia.com/advisories/15193
XForce ISS Database: gnutls-record-parsing-dos(20328)
https://exchange.xforce.ibmcloud.com/vulnerabilities/20328
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.