5
CVSSv2

CVE-2005-1431

Published: 03/05/2005 Updated: 11/10/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The "record packet parsing" in GnuTLS 1.2 prior to 1.2.3 and 1.0 prior to 1.0.25 allows remote malicious users to cause a denial of service, possibly related to padding bytes in gnutils_cipher.c.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu gnutls 1.0.23

gnu gnutls 1.0.24

gnu gnutls 1.2.0

gnu gnutls 1.0.19

gnu gnutls 1.0.20

gnu gnutls 1.0.18

gnu gnutls 1.2.1

gnu gnutls 1.2.2

gnu gnutls 1.0.21

gnu gnutls 1.0.22

Vendor Advisories

Synopsis gnutls security update Type/Severity Security Advisory: Moderate Topic Updated GnuTLS packages that fix a remote denial of servicevulnerability are available for Red Hat Enterprise Linux 4This update has been rated as having moderate security impact by the RedHat Security Response Team D ...
A Denial of Service vulnerability was discovered in the GNU TLS library, which provides common cryptographic algorithms and is used by many applications in Ubuntu Due to a missing sanity check of the padding length field, specially crafted ciphertext blocks caused an out of bounds memory access which could crash the application It was not possibl ...