Buffer overflow in the readserverhello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "gnutls-bin",
"binary_version": "3.0.11+really2.12.23-12ubuntu2.1"
},
{
"binary_name": "libgnutls-dev",
"binary_version": "2.12.23-12ubuntu2.1"
},
{
"binary_name": "libgnutls-openssl27",
"binary_version": "2.12.23-12ubuntu2.1"
},
{
"binary_name": "libgnutls26",
"binary_version": "2.12.23-12ubuntu2.1"
},
{
"binary_name": "libgnutlsxx27",
"binary_version": "2.12.23-12ubuntu2.1"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "guile-gnutls",
"binary_version": "3.2.11-2ubuntu1.1"
},
{
"binary_name": "libgnutls-xssl0",
"binary_version": "3.2.11-2ubuntu1.1"
},
{
"binary_name": "libgnutls28",
"binary_version": "3.2.11-2ubuntu1.1"
},
{
"binary_name": "libgnutls28-dev",
"binary_version": "3.2.11-2ubuntu1.1"
},
{
"binary_name": "libgnutlsxx28",
"binary_version": "3.2.11-2ubuntu1.1"
}
]
}