CVE-2014-3466

CVSS V2 Medium 6.8 CVSS V3 None
Description
Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.
Overview
  • CVE ID
  • CVE-2014-3466
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2014-06-03T14:55:10
  • Last Modified Date
  • 2017-12-29T02:29:21
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:gnu:gnutls:3.3.0:-:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.3.0:pre0:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.3.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.3.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:* 1 OR 3.1.24
cpe:2.3:a:gnu:gnutls:3.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.20:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.1.23:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.2.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.2.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.2.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.2.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.2.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.2.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.2.8.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.2.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.2.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.2.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.2.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.2.12.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.2.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:gnutls:3.2.14:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 6.8
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 6.4
References
Reference URL Reference Tags
http://www.gnutls.org/security.html Vendor Advisory
http://www.debian.org/security/2014/dsa-2944
https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd Exploit Patch
https://bugzilla.redhat.com/show_bug.cgi?id=1101932
http://rhn.redhat.com/errata/RHSA-2014-0594.html
http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html
http://secunia.com/advisories/58601
http://secunia.com/advisories/59016
http://secunia.com/advisories/58642
http://linux.oracle.com/errata/ELSA-2014-0595.html
http://secunia.com/advisories/58340
http://secunia.com/advisories/58598
http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html
http://secunia.com/advisories/59057
http://secunia.com/advisories/59021
http://linux.oracle.com/errata/ELSA-2014-0594.html
http://secunia.com/advisories/59086
http://rhn.redhat.com/errata/RHSA-2014-0815.html
http://www-01.ibm.com/support/docview.wss?uid=swg21678776
http://secunia.com/advisories/59838
http://www.securitytracker.com/id/1030314
http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/ Exploit
http://www.securityfocus.com/bid/67741
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155
http://www.novell.com/support/kb/doc.php?id=7015303
http://www.novell.com/support/kb/doc.php?id=7015302
http://secunia.com/advisories/60384
http://secunia.com/advisories/59408
http://www.ubuntu.com/usn/USN-2229-1
http://rhn.redhat.com/errata/RHSA-2014-0684.html
http://rhn.redhat.com/errata/RHSA-2014-0595.html
http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html
History
Created Old Value New Value Data Type Notes
2022-05-10 18:54:02 Added to TrackCVE
2022-12-01 23:21:04 2014-06-03T14:55Z 2014-06-03T14:55:10 CVE Published Date updated
2022-12-01 23:21:04 2017-12-29T02:29:21 CVE Modified Date updated
2022-12-01 23:21:04 Modified Vulnerability Status updated