Show filters
68 Total Results
Displaying 1-10 of 68
Sort by:
Attacker Value
Unknown

CVE-2024-0567

Disclosure Date: January 16, 2024 (last updated July 08, 2024)
A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.
Attacker Value
Unknown

CVE-2024-0553

Disclosure Date: January 16, 2024 (last updated July 08, 2024)
A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.
Attacker Value
Unknown

CVE-2023-5981

Disclosure Date: November 28, 2023 (last updated July 08, 2024)
A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.
Attacker Value
Unknown

CVE-2023-25824

Disclosure Date: February 23, 2023 (last updated November 08, 2023)
Mod_gnutls is a TLS module for Apache HTTPD based on GnuTLS. Versions from 0.9.0 to 0.12.0 (including) did not properly fail blocking read operations on TLS connections when the transport hit timeouts. Instead it entered an endless loop retrying the read operation, consuming CPU resources. This could be exploited for denial of service attacks. If trace level logging was enabled, it would also produce an excessive amount of log output during the loop, consuming disk space. The problem has been fixed in commit d7eec4e598158ab6a98bf505354e84352f9715ec, please update to version 0.12.1. There are no workarounds, users who cannot update should apply the errno fix detailed in the security advisory.
Attacker Value
Unknown

CVE-2023-0361

Disclosure Date: February 15, 2023 (last updated October 08, 2023)
A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.
Attacker Value
Unknown

CVE-2021-4209

Disclosure Date: August 24, 2022 (last updated November 29, 2024)
A NULL pointer dereference flaw was found in GnuTLS. As Nettle's hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.
Attacker Value
Unknown

CVE-2022-2509

Disclosure Date: August 01, 2022 (last updated October 08, 2023)
A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.
Attacker Value
Unknown

CVE-2021-20231

Disclosure Date: March 12, 2021 (last updated November 08, 2023)
A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.
Attacker Value
Unknown

CVE-2021-20232

Disclosure Date: March 12, 2021 (last updated November 08, 2023)
A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.
Attacker Value
Unknown

CVE-2020-24659

Disclosure Date: September 04, 2020 (last updated November 08, 2023)
An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application's error handling path, where the gnutls_deinit function is called after detecting a handshake failure.