New GnuTLS buffer overflow

by
in security on (#3ND)
story imageAnother week, another buffer overflow in a crypto library! This time, GnuTLS is the culprit as it misses the length checks for the session ID in the ServerHello message. Because most server applications choose OpenSSL over GnuTLS, the list of affected packages is actually rather small - but make sure your systems are up to date regardless.

Packages (Score: 3, Informative)

by bryan@pipedot.org on 2014-06-04 22:05 (#20R)

Exim (mail server) and CUPS (print server) are on the list.
Post Comment
Subject
Comment
Captcha
Enter the number six thousand one hundred and ninety eight in digits: