CVE-2008-2377

critical

Description

Use-after-free vulnerability in the _gnutls_handshake_hash_buffers_clear function in lib/gnutls_handshake.c in libgnutls in GnuTLS 2.3.5 through 2.4.0 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via TLS transmission of data that is improperly used when the peer calls gnutls_handshake within a normal session, leading to attempted access to a deallocated libgcrypt handle.

References

https://issues.rpath.com/browse/RPL-2650

https://exchange.xforce.ibmcloud.com/vulnerabilities/44486

http://www.vupen.com/english/advisories/2008/2398

http://www.securityfocus.com/bid/30713

http://www.gnu.org/software/gnutls/security.html

http://secunia.com/advisories/31505

http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/2947

Details

Source: Mitre, NVD

Published: 2008-08-08

Updated: 2017-08-08

Risk Information

CVSS v2

Base Score: 7.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical