Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.61034
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1581-1)
Summary:The remote host is missing an update for the Debian 'gnutls13' package(s) announced via the DSA-1581-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'gnutls13' package(s) announced via the DSA-1581-1 advisory.

Vulnerability Insight:
Several remote vulnerabilities have been discovered in GNUTLS, an implementation of the SSL/TLS protocol suite.

NOTE: The libgnutls13 package, which provides the GNUTLS library, does not contain logic to automatically restart potentially affected services. You must restart affected services manually (mainly Exim, using /etc/init.d/exim4 restart) after applying the update, to make the changes fully effective. Alternatively, you can reboot the system.

The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2008-1948

A pre-authentication heap overflow involving oversized session resumption data may lead to arbitrary code execution.

CVE-2008-1949

Repeated client hellos may result in a pre-authentication denial of service condition due to a null pointer dereference.

CVE-2008-1950

Decoding cipher padding with an invalid record length may cause GNUTLS to read memory beyond the end of the received record, leading to a pre-authentication denial of service condition.

For the stable distribution (etch), these problems have been fixed in version 1.4.4-3+etch1. (Builds for the arm architecture are currently not available and will be released later.)

For the unstable distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your GNUTLS packages.

Affected Software/OS:
'gnutls13' package(s) on Debian 4.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-1948
BugTraq ID: 29292
http://www.securityfocus.com/bid/29292
Bugtraq: 20080520 Vulnerability Advisory on GnuTLS (Google Search)
http://www.securityfocus.com/archive/1/492282/100/0/threaded
Bugtraq: 20080522 rPSA-2008-0174-1 gnutls (Google Search)
http://www.securityfocus.com/archive/1/492464/100/0/threaded
CERT/CC vulnerability note: VU#111034
http://www.kb.cert.org/vuls/id/111034
Debian Security Information: DSA-1581 (Google Search)
http://www.debian.org/security/2008/dsa-1581
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00487.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00590.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00615.html
http://security.gentoo.org/glsa/glsa-200805-20.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:106
http://www.cert.fi/haavoittuvuudet/advisory-gnutls.html
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00051.html
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00060.html
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00055.html
http://www.openwall.com/lists/oss-security/2008/05/20/1
http://www.openwall.com/lists/oss-security/2008/05/20/2
http://www.openwall.com/lists/oss-security/2008/05/20/3
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10935
http://www.redhat.com/support/errata/RHSA-2008-0489.html
http://www.redhat.com/support/errata/RHSA-2008-0492.html
http://www.securitytracker.com/id?1020057
http://secunia.com/advisories/30287
http://secunia.com/advisories/30302
http://secunia.com/advisories/30317
http://secunia.com/advisories/30324
http://secunia.com/advisories/30330
http://secunia.com/advisories/30331
http://secunia.com/advisories/30338
http://secunia.com/advisories/30355
http://secunia.com/advisories/31939
http://securityreason.com/securityalert/3902
SuSE Security Announcement: SUSE-SA:2008:046 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00003.html
http://www.ubuntu.com/usn/usn-613-1
http://www.vupen.com/english/advisories/2008/1582/references
http://www.vupen.com/english/advisories/2008/1583/references
XForce ISS Database: gnutls-gnutlsservernamerecvparams-bo(42532)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42532
Common Vulnerability Exposure (CVE) ID: CVE-2008-1949
CERT/CC vulnerability note: VU#252626
http://www.kb.cert.org/vuls/id/252626
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9519
http://www.securitytracker.com/id?1020058
XForce ISS Database: gnutls-gnutlsrecvclientkxmessage-bo(42530)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42530
Common Vulnerability Exposure (CVE) ID: CVE-2008-1950
CERT/CC vulnerability note: VU#659209
http://www.kb.cert.org/vuls/id/659209
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11393
http://www.securitytracker.com/id?1020059
XForce ISS Database: gnutls-gnutlsciphertext2compressed-bo(42533)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42533
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.