First published: Fri Aug 08 2008(Updated: )
Use-after-free vulnerability in the _gnutls_handshake_hash_buffers_clear function in lib/gnutls_handshake.c in libgnutls in GnuTLS 2.3.5 through 2.4.0 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via TLS transmission of data that is improperly used when the peer calls gnutls_handshake within a normal session, leading to attempted access to a deallocated libgcrypt handle.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GnuTLS | =2.3.5 | |
GnuTLS | =2.3.8 | |
GnuTLS | =2.3.9 | |
GnuTLS | =2.4.0 | |
GnuTLS | =2.3.7 | |
GnuTLS | =2.3.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2377 is considered a high-severity vulnerability due to its potential to cause denial of service and possibly execute arbitrary code.
To fix CVE-2008-2377, upgrade GnuTLS to version 2.4.1 or later as it includes patches that resolve this vulnerability.
CVE-2008-2377 affects GnuTLS versions 2.3.5 through 2.4.0.
Yes, CVE-2008-2377 can potentially allow remote attackers to execute arbitrary code under certain conditions.
Users of affected GnuTLS versions may experience crashes and potential exploits from remote attackers taking advantage of this vulnerability.