CVE-2008-1948
Publication date 21 May 2008
Last updated 24 July 2024
Ubuntu priority
The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a zero value for the length of Server Names, which leads to a buffer overflow in session resumption data in the pack_security_parameters function, aka GNUTLS-SA-2008-1-1.
Status
Package | Ubuntu Release | Status |
---|---|---|
gnutls12 | 8.04 LTS hardy | Not in release |
7.10 gutsy | Not in release | |
7.04 feisty | Not in release | |
6.06 LTS dapper |
Fixed 1.2.9-2ubuntu1.2
|
|
gnutls13 | 8.04 LTS hardy |
Fixed 2.0.4-1ubuntu2.1
|
7.10 gutsy |
Fixed 1.6.3-1ubuntu0.1
|
|
7.04 feisty |
Fixed 1.4.4-3ubuntu0.1
|
|
6.06 LTS dapper | Not in release | |
gnutls26 | 8.04 LTS hardy | Not in release |
7.10 gutsy | Not in release | |
7.04 feisty | Not in release | |
6.06 LTS dapper | Not in release |