CVE-2014-3466Improper Restriction of Operations within the Bounds of a Memory Buffer in Gnutls

Severity
6.8MEDIUMNVD
EPSS
13.7%
top 5.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 3
Latest updateMay 14

Description

Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages1 packages

NVDgnu/gnutls3.1.24+45

Patches

🔴Vulnerability Details

3
GHSA
GHSA-cc2g-hj2r-x228: Buffer overflow in the read_server_hello function in lib/gnutls_handshake2022-05-14
CVEList
CVE-2014-3466: Buffer overflow in the read_server_hello function in lib/gnutls_handshake2014-06-03
OSV
CVE-2014-3466: Buffer overflow in the read_server_hello function in lib/gnutls_handshake2014-06-03

📋Vendor Advisories

3
Ubuntu
GnuTLS vulnerability2014-06-02
Red Hat
gnutls: insufficient session id length check in _gnutls_read_server_hello (GNUTLS-SA-2014-3)2014-05-30
Debian
CVE-2014-3466: gnutls28 - Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in G...2014

💬Community

4
Bugzilla
CVE-2014-3466 gnutls: insufficient session id length check in _gnutls_read_server_hello (GNUTLS-SA-2014-3) [fedora-all]2014-05-30
Bugzilla
CVE-2014-3466 mingw-gnutls: gnutls: insufficient session id length check in _gnutls_read_server_hello (GNUTLS-SA-2014-3) [fedora-all]2014-05-30
Bugzilla
CVE-2014-3466 mingw32-gnutls: gnutls: insufficient session id length check in _gnutls_read_server_hello (GNUTLS-SA-2014-3) [epel-5]2014-05-30
Bugzilla
CVE-2014-3466 gnutls: insufficient session id length check in _gnutls_read_server_hello (GNUTLS-SA-2014-3)2014-05-28
CVE-2014-3466 — GNU Gnutls vulnerability | cvebase