Gnu Gnutls vulnerabilities
66 known vulnerabilities affecting gnu/gnutls.
Total CVEs
66
CISA KEV
0
Public exploits
4
Exploited in wild
0
Severity breakdown
CRITICAL7HIGH24MEDIUM35
Vulnerabilities
Page 3 of 4
CVE-2014-0092MEDIUMCVSS 5.8≤ 3.2.11v3.2.0+33 more2014-03-07
CVE-2014-0092 [MEDIUM] CWE-310 CVE-2014-0092: lib/x509/verify.c in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 does not properly handle unspecifi
lib/x509/verify.c in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 does not properly handle unspecified errors when verifying X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
nvd
CVE-2013-4466MEDIUMCVSS 5.0v3.1.0v3.1.1+18 more2013-11-20
CVE-2013-4466 [MEDIUM] CWE-119 CVE-2013-4466: Buffer overflow in the dane_query_tlsa function in the DANE library (libdane) in GnuTLS 3.1.x before
Buffer overflow in the dane_query_tlsa function in the DANE library (libdane) in GnuTLS 3.1.x before 3.1.15 and 3.2.x before 3.2.5 allows remote servers to cause a denial of service (memory corruption) via a response with more than four DANE entries.
nvd
CVE-2013-4487MEDIUMCVSS 5.0v3.2.0v3.2.1+20 more2013-11-20
CVE-2013-4487 [MEDIUM] CVE-2013-4487: Off-by-one error in the dane_raw_tlsa in the DANE library (libdane) in GnuTLS 3.1.x before 3.1.16 an
Off-by-one error in the dane_raw_tlsa in the DANE library (libdane) in GnuTLS 3.1.x before 3.1.16 and 3.2.x before 3.2.6 allows remote servers to cause a denial of service (memory corruption) via a response with more than four DANE entries. NOTE: this issue is due to an incomplete fix for CVE-2013-4466.
nvd
CVE-2013-2116MEDIUMCVSS 5.0v2.12.232013-07-03
CVE-2013-2116 [MEDIUM] CVE-2013-2116: The _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in GnuTLS 2.12.23 allows remote at
The _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in GnuTLS 2.12.23 allows remote attackers to cause a denial of service (buffer over-read and crash) via a crafted padding length. NOTE: this might be due to an incorrect fix for CVE-2013-0169.
nvd
CVE-2013-1619MEDIUMCVSS 4.0v2.0.0v2.0.1+116 more2013-02-08
CVE-2013-1619 [MEDIUM] CVE-2013-1619: The TLS implementation in GnuTLS before 2.12.23, 3.0.x before 3.0.28, and 3.1.x before 3.1.7 does no
The TLS implementation in GnuTLS before 2.12.23, 3.0.x before 3.0.28, and 3.1.x before 3.1.7 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timi
nvd
CVE-2012-1569MEDIUMCVSS 5.0≤ 3.0.15v1.0.16+165 more2012-03-26
CVE-2012-1569 [MEDIUM] CWE-189 CVE-2012-1569: The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before
The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 str
nvd
CVE-2012-1573MEDIUMCVSS 5.0≤ 2.12.16v2.0.0+90 more2012-03-26
CVE-2012-1573 [MEDIUM] CWE-310 CVE-2012-1573: gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle
gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structure.
nvd
CVE-2012-1663HIGHCVSS 7.5PoC≤ 3.0.13v1.0.16+163 more2012-03-13
CVE-2012-1663 [HIGH] CWE-399 CVE-2012-1663: Double free vulnerability in libgnutls in GnuTLS before 3.0.14 allows remote attackers to cause a de
Double free vulnerability in libgnutls in GnuTLS before 3.0.14 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted certificate list.
nvd
CVE-2012-0390MEDIUMCVSS 4.3≤ 3.0.10v2.2.4+54 more2012-01-06
CVE-2012-0390 [MEDIUM] CVE-2012-0390: The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain error-handling code only if th
The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain error-handling code only if there is a specific relationship between a padding length and the ciphertext size, which makes it easier for remote attackers to recover partial plaintext via a timing side-channel attack, a related issue to CVE-2011-4108.
nvd
CVE-2011-4128MEDIUMCVSS 4.3v2.12.0v2.12.1+20 more2011-12-08
CVE-2011-4128 [MEDIUM] CWE-119 CVE-2011-4128: Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x bef
Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to cause a denial of service (application crash) via a large SessionTicket.
nvd
CVE-2006-7239MEDIUMCVSS 5.0≤ 1.4.1v1.0.16+40 more2010-05-24
CVE-2006-7239 [MEDIUM] CWE-310 CVE-2006-7239: The _gnutls_x509_oid2mac_algorithm function in lib/gnutls_algorithms.c in GnuTLS before 1.4.2 allows
The _gnutls_x509_oid2mac_algorithm function in lib/gnutls_algorithms.c in GnuTLS before 1.4.2 allows remote attackers to cause a denial of service (crash) via a crafted X.509 certificate that uses a hash algorithm that is not supported by GnuTLS, which triggers a NULL pointer dereference.
nvd
CVE-2010-0731HIGHCVSS 7.5≤ 1.2.0v1.0.16+20 more2010-03-26
CVE-2010-0731 [HIGH] CWE-119 CVE-2010-0731: The gnutls_x509_crt_get_serial function in the GnuTLS library before 1.2.1, when running on big-endi
The gnutls_x509_crt_get_serial function in the GnuTLS library before 1.2.1, when running on big-endian, 64-bit platforms, calls the asn1_read_value with a pointer to the wrong data type and the wrong length value, which allows remote attackers to bypass the certificate revocation list (CRL) check and cause a stack-based buffer overflow via a crafted X.5
nvd
CVE-2009-3555MEDIUMCVSS 5.8PoC≤ 2.8.52009-11-09
CVE-2009-3555 [MEDIUM] CWE-295 CVE-2009-3555: The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Infor
The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly
nvd
CVE-2009-2730HIGHCVSS 7.5≤ 2.8.1v1.0.16+119 more2009-08-12
CVE-2009-2730 [HIGH] CWE-310 CVE-2009-2730: libgnutls in GnuTLS before 2.8.2 does not properly handle a '\0' character in a domain name in the s
libgnutls in GnuTLS before 2.8.2 does not properly handle a '\0' character in a domain name in the subject's (1) Common Name (CN) or (2) Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
nvd
CVE-2009-2409MEDIUMCVSS 5.1fixed in 2.6.4≥ 2.7.0, < 2.7.42009-07-30
CVE-2009-2409 [MEDIUM] CWE-295 CVE-2009-2409: The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 a
The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scop
nvd
CVE-2009-1416HIGHCVSS 7.5PoCv2.5.0v2.6.0+5 more2009-04-30
CVE-2009-1416 [HIGH] CWE-310 CVE-2009-1416: lib/gnutls_pk.c in libgnutls in GnuTLS 2.5.0 through 2.6.5 generates RSA keys stored in DSA structur
lib/gnutls_pk.c in libgnutls in GnuTLS 2.5.0 through 2.6.5 generates RSA keys stored in DSA structures, instead of the intended DSA keys, which might allow remote attackers to spoof signatures on certificates or have unspecified other impact by leveraging an invalid DSA key.
nvd
CVE-2009-1417MEDIUMCVSS 5.0≤ 2.6.5v1.0.16+115 more2009-04-30
CVE-2009-1417 [MEDIUM] CWE-310 CVE-2009-1417: gnutls-cli in GnuTLS before 2.6.6 does not verify the activation and expiration times of X.509 certi
gnutls-cli in GnuTLS before 2.6.6 does not verify the activation and expiration times of X.509 certificates, which allows remote attackers to successfully present a certificate that is (1) not yet valid or (2) no longer valid, related to lack of time checks in the _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls_x509, as used
nvd
CVE-2009-1415MEDIUMCVSS 4.3PoCfixed in 2.6.62009-04-30
CVE-2009-1415 [MEDIUM] CWE-824 CVE-2009-1415: lib/pk-libgcrypt.c in libgnutls in GnuTLS before 2.6.6 does not properly handle invalid DSA signatur
lib/pk-libgcrypt.c in libgnutls in GnuTLS before 2.6.6 does not properly handle invalid DSA signatures, which allows remote attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a malformed DSA key that triggers a (1) free of an uninitialized pointer or (2) double free.
nvd
CVE-2008-4989MEDIUMCVSS 5.9fixed in 2.6.12008-11-13
CVE-2008-4989 [MEDIUM] CWE-295 CVE-2008-4989: The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS before 2.6.
The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS before 2.6.1 trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate, which allows man-in-the-middle attackers to insert a spoofed certificate for any Distinguished Name (DN).
nvd
CVE-2008-2377HIGHCVSS 7.6v2.3.5v2.3.6+4 more2008-08-08
CVE-2008-2377 [HIGH] CWE-119 CVE-2008-2377: Use-after-free vulnerability in the _gnutls_handshake_hash_buffers_clear function in lib/gnutls_hand
Use-after-free vulnerability in the _gnutls_handshake_hash_buffers_clear function in lib/gnutls_handshake.c in libgnutls in GnuTLS 2.3.5 through 2.4.0 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via TLS transmission of data that is improperly used when the peer calls gnutls_handshake within a normal se
nvd