Out-of-Bounds

Affecting gnutls28 package, versions <3.3.8-6+deb8u5

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.

References

CVSS Score

9.8
high severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    High
  • Availability
    High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE
CVE-2017-5336
CWE
CWE-119
Snyk ID
SNYK-DEBIAN8-GNUTLS28-340690
Disclosed
24 Mar, 2017
Published
24 Mar, 2017