Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu gnutls 2.6.6 vulnerabilities and exploits
(subscribe to this query)
7.4
CVSSv3
CVE-2023-0361
A timing side-channel in the handling of RSA ClientKeyExchange messages exists in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker woul...
Gnu Gnutls 3.6.8-11.el8 2
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 36
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Netapp Ontap Select Deploy Administration Utility -
Netapp Active Iq Unified Manager -
Netapp Converged Systems Advisor Agent -
NA
CVE-2013-1619
The TLS implementation in GnuTLS prior to 2.12.23, 3.0.x prior to 3.0.28, and 3.1.x prior to 3.1.7 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote malicious users to c...
Gnu Gnutls 2.12.2
Gnu Gnutls 2.12.3
Gnu Gnutls 2.6.4
Gnu Gnutls 2.6.5
Gnu Gnutls 2.6.1
Gnu Gnutls 2.12.17
Gnu Gnutls 2.12.9
Gnu Gnutls 2.12.10
Gnu Gnutls 2.8.4
Gnu Gnutls 2.8.5
Gnu Gnutls 2.10.5
Gnu Gnutls 2.12.4
Gnu Gnutls 2.12.5
Gnu Gnutls 2.4.2
Gnu Gnutls 2.4.1
Gnu Gnutls 2.7.4
Gnu Gnutls 2.12.15
Gnu Gnutls 2.3.11
Gnu Gnutls 2.12.11
Gnu Gnutls 2.12.12
Gnu Gnutls 2.8.6
Gnu Gnutls 2.10.0
NA
CVE-2012-1569
The asn1_get_length_der function in decoding.c in GNU Libtasn1 prior to 2.12, as used in GnuTLS prior to 3.0.16 and other products, does not properly handle certain large length values, which allows remote malicious users to cause a denial of service (heap memory corruption and a...
Gnu Libtasn1 2.10
Gnu Libtasn1 2.3
Gnu Libtasn1 2.2
Gnu Libtasn1 1.3
Gnu Libtasn1 1.2
Gnu Libtasn1 0.3.6
Gnu Libtasn1 0.3.5
Gnu Libtasn1 0.2.17
Gnu Libtasn1 0.2.16
Gnu Libtasn1 0.2.15
Gnu Libtasn1 0.2.8
Gnu Libtasn1 0.2.7
Gnu Libtasn1 0.2.0
Gnu Libtasn1 0.1.2
Gnu Gnutls 1.0.20
Gnu Gnutls 1.0.21
Gnu Libtasn1 2.5
Gnu Libtasn1 2.4
Gnu Libtasn1 1.5
Gnu Libtasn1 1.4
Gnu Libtasn1 0.3.8
Gnu Libtasn1 0.3.7
NA
CVE-2012-1573
gnutls_cipher.c in libgnutls in GnuTLS prior to 2.12.17 and 3.x prior to 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote malicious users to cause a denial of service (heap memory corruption and application crash) via a crafted record, as de...
Gnu Gnutls 2.12.15
Gnu Gnutls 2.3.5
Gnu Gnutls 2.10.2
Gnu Gnutls 2.0.0
Gnu Gnutls 2.8.3
Gnu Gnutls 2.3.4
Gnu Gnutls 2.12.2
Gnu Gnutls 2.7.4
Gnu Gnutls 2.6.1
Gnu Gnutls 2.2.4
Gnu Gnutls 2.1.0
Gnu Gnutls 2.3.1
Gnu Gnutls 2.12.7
Gnu Gnutls 2.12.5
Gnu Gnutls 2.2.5
Gnu Gnutls 2.1.1
Gnu Gnutls 2.3.8
Gnu Gnutls 2.8.5
Gnu Gnutls 2.1.7
Gnu Gnutls 2.10.4
Gnu Gnutls 2.1.4
Gnu Gnutls 2.6.0
NA
CVE-2012-1663
Double free vulnerability in libgnutls in GnuTLS prior to 3.0.14 allows remote malicious users to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted certificate list.
Gnu Gnutls 1.1.21
Gnu Gnutls 1.2.10
Gnu Gnutls 1.2.3
Gnu Gnutls 1.2.8
Gnu Gnutls 1.2.9
Gnu Gnutls 1.4.1
Gnu Gnutls 1.0.22
Gnu Gnutls 1.0.16
Gnu Gnutls 2.4.1
Gnu Gnutls 1.1.15
Gnu Gnutls 1.0.24
Gnu Gnutls 1.4.5
Gnu Gnutls 2.10.5
Gnu Gnutls 1.1.13
Gnu Gnutls 1.7.18
Gnu Gnutls 2.0.3
Gnu Gnutls 1.4.3
Gnu Gnutls 1.5.2
Gnu Gnutls 2.1.0
Gnu Gnutls 1.5.5
Gnu Gnutls 2.1.5
Gnu Gnutls 2.1.8
1 EDB exploit
NA
CVE-2012-0390
The DTLS implementation in GnuTLS 3.0.10 and previous versions executes certain error-handling code only if there is a specific relationship between a padding length and the ciphertext size, which makes it easier for remote malicious users to recover partial plaintext via a timin...
Gnu Gnutls 3.0.9
Gnu Gnutls 3.0.8
Gnu Gnutls 3.0.1
Gnu Gnutls 3.0.0
Gnu Gnutls 2.12.7
Gnu Gnutls 2.12.6
Gnu Gnutls 2.12.0
Gnu Gnutls 2.10.5
Gnu Gnutls 2.10.1-x86
Gnu Gnutls 2.10.0
Gnu Gnutls 2.6.6
Gnu Gnutls 2.6.5
Gnu Gnutls 2.4.2
Gnu Gnutls 2.4.1
Gnu Gnutls 3.0.7
Gnu Gnutls 3.0.6
Gnu Gnutls 2.12.14
Gnu Gnutls
Gnu Gnutls 3.0.3
Gnu Gnutls 3.0.2
Gnu Gnutls 2.12.9
Gnu Gnutls 2.12.8
NA
CVE-2009-2730
libgnutls in GnuTLS prior to 2.8.2 does not properly handle a '\0' character in a domain name in the subject's (1) Common Name (CN) or (2) Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle malicious users to spoof arbitrar...
Gnu Gnutls 2.6.5
Gnu Gnutls 2.4.2
Gnu Gnutls 2.3.3
Gnu Gnutls 2.3.9
Gnu Gnutls 1.0.18
Gnu Gnutls 1.0.19
Gnu Gnutls 1.1.14
Gnu Gnutls 1.1.15
Gnu Gnutls 1.2.0
Gnu Gnutls 1.2.11
Gnu Gnutls 1.2.6
Gnu Gnutls 1.2.8.1a1
Gnu Gnutls 1.3.4
Gnu Gnutls 1.3.5
Gnu Gnutls 2.2.1
Gnu Gnutls 1.7.12
Gnu Gnutls 2.2.5
Gnu Gnutls 1.7.16
Gnu Gnutls 2.0.3
Gnu Gnutls 1.4.3
Gnu Gnutls 2.0.0
Gnu Gnutls 1.5.2
NA
CVE-2009-1417
gnutls-cli in GnuTLS prior to 2.6.6 does not verify the activation and expiration times of X.509 certificates, which allows remote malicious users to successfully present a certificate that is (1) not yet valid or (2) no longer valid, related to lack of time checks in the _gnutls...
Gnu Gnutls 1.0.22
Gnu Gnutls 1.0.23
Gnu Gnutls 1.0.24
Gnu Gnutls 1.1.21
Gnu Gnutls 1.1.20
Gnu Gnutls 1.1.15
Gnu Gnutls 1.0.25
Gnu Gnutls 1.2.3
Gnu Gnutls 1.2.2
Gnu Gnutls 1.3.4
Gnu Gnutls 1.2.7
Gnu Gnutls 1.5.0
Gnu Gnutls 1.4.4
Gnu Gnutls 1.6.2
Gnu Gnutls 1.5.5
Gnu Gnutls 1.7.14
Gnu Gnutls 1.7.15
Gnu Gnutls 1.0.18
Gnu Gnutls 1.0.19
Gnu Gnutls 1.1.19
Gnu Gnutls 1.1.16
Gnu Gnutls 1.2.1
NA
CVE-2009-1415
lib/pk-libgcrypt.c in libgnutls in GnuTLS prior to 2.6.6 does not properly handle invalid DSA signatures, which allows remote malicious users to cause a denial of service (application crash) and possibly have unspecified other impact via a malformed DSA key that triggers a (1) fr...
Gnu Gnutls
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started