Buffer overflow in the readserverhello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "3.0.11+really2.12.23-12ubuntu2.1",
"binary_name": "gnutls-bin"
},
{
"binary_version": "2.12.23-12ubuntu2.1",
"binary_name": "libgnutls-dev"
},
{
"binary_version": "2.12.23-12ubuntu2.1",
"binary_name": "libgnutls-openssl27"
},
{
"binary_version": "2.12.23-12ubuntu2.1",
"binary_name": "libgnutls26"
},
{
"binary_version": "2.12.23-12ubuntu2.1",
"binary_name": "libgnutlsxx27"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "3.2.11-2ubuntu1.1",
"binary_name": "guile-gnutls"
},
{
"binary_version": "3.2.11-2ubuntu1.1",
"binary_name": "libgnutls-xssl0"
},
{
"binary_version": "3.2.11-2ubuntu1.1",
"binary_name": "libgnutls28"
},
{
"binary_version": "3.2.11-2ubuntu1.1",
"binary_name": "libgnutls28-dev"
},
{
"binary_version": "3.2.11-2ubuntu1.1",
"binary_name": "libgnutlsxx28"
}
]
}