Unrated severityNVD Advisory· Published Nov 13, 2014· Updated May 6, 2026
CVE-2014-8564
CVE-2014-8564
Description
The _gnutls_ecc_ansi_x963_export function in gnutls_ecc.c in GnuTLS 3.x before 3.1.28, 3.2.x before 3.2.20, and 3.3.x before 3.3.10 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) Elliptic Curve Cryptography (ECC) certificate or (2) certificate signing requests (CSR), related to generating key IDs.
Affected products
100cpe:2.3:a:gnu:gnutls:3.0:*:*:*:*:*:*:*+ 90 more
- cpe:2.3:a:gnu:gnutls:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.19:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.20:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.21:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.22:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.23:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.24:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.25:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.26:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.27:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.28:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.11:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.12:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.13:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.14:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.15:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.16:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.17:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.18:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.19:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.20:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.21:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.22:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.23:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.24:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.25:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.26:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.27:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.2.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.2.15:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.2.16:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.2.17:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.2.18:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.2.19:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.2.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.0:-:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.0:pre0:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.9:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- www.ubuntu.com/usn/USN-2403-1nvdPatchThird Party Advisory
- lists.opensuse.org/opensuse-updates/2014-11/msg00084.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-1846.htmlnvdThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue Tracking
- secunia.com/advisories/59991nvd
- secunia.com/advisories/62284nvd
- secunia.com/advisories/62294nvd
News mentions
0No linked articles in our index yet.