First published: Fri Aug 08 2008(Updated: )
Use-after-free vulnerability in the _gnutls_handshake_hash_buffers_clear function in lib/gnutls_handshake.c in libgnutls in GnuTLS 2.3.5 through 2.4.0 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via TLS transmission of data that is improperly used when the peer calls gnutls_handshake within a normal session, leading to attempted access to a deallocated libgcrypt handle.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU GnuTLS | =2.3.5 | |
GNU GnuTLS | =2.3.8 | |
GNU GnuTLS | =2.3.9 | |
GNU GnuTLS | =2.4.0 | |
GNU GnuTLS | =2.3.7 | |
GNU GnuTLS | =2.3.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.