Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record with an invalid Record Length, which leads to an invalid cipher padding length, aka GNUTLS-SA-2008-1-3.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T08:41:00.178Z
Reserved: 2008-04-24T00:00:00
Link: CVE-2008-1950

No data.

Status : Deferred
Published: 2008-05-21T13:24:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-1950
