Vulnerability Note VU#252626
GnuTLS Client Hello repeat Denial of Service
A vulnerability exists in GnuTLS that may allow a remote attacker to cause a denial of service.
GnuTLS contains a vulnerability in gnults-serv that may result in a denial of service when handling a specially crafted TLS packet that contains multiple Client Hello messages. According to CERT-FI Vulnerability Advisory on GnuTLS:
The program reads the first Client Hello and then proceeds to send Server Hello, Certificate, Certificate Request and Server Hello Done messages. After sending these, it apperently reads next Client Hello from the message sent earlier and crashes to segmentation fault caused by null pointer.
Note that this issue may affect GnuTLS versions prior to 2.2.5 and also affects version 2.3.0.
A remote, unauthorized attacker may be able to cause a denial of service.
Upgrade or Apply Patch
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|GnuTLS||Affected||-||29 May 2008|
CVSS Metrics (Learn More)
This issue was reported in GnuTLS Security Advisory SA-2008-01. GnuTLS credits Ossi Herrala and Jukka Taimisto from the CROSS project at Codenomicon Ltd. for reporting this issue.
This document was written by Chris Taschner.
- CVE IDs: CVE-2008-1949
- Date Public: 19 May 2008
- Date First Published: 29 May 2008
- Date Last Updated: 29 May 2008
- Severity Metric: 9.19
- Document Revision: 13
If you have feedback, comments, or additional information about this vulnerability, please send us email.