VYPR

rpm package

suse/gnutls&distro=SUSE Linux Enterprise Server for SAP Applications 11 SP4

pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Vulnerabilities (9)

  • CVE-2015-8313Dec 20, 2019
    affected < 2.4.1-24.39.60.1fixed 2.4.1-24.39.60.1

    GnuTLS incorrectly validates the first byte of padding in CBC modes

  • CVE-2016-8610HigNov 13, 2017
    affected < 2.4.1-24.39.67.1fixed 2.4.1-24.39.67.1

    A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amoun

  • CVE-2017-6891HigMay 22, 2017
    affected < 2.4.1-24.39.70.1fixed 2.4.1-24.39.70.1

    Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility.

  • CVE-2017-7869HigApr 14, 2017
    affected < 2.4.1-24.39.70.1fixed 2.4.1-24.39.70.1

    GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10.

  • CVE-2017-5337CriMar 24, 2017
    affected < 2.4.1-24.39.67.1fixed 2.4.1-24.39.67.1

    Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.

  • CVE-2017-5336CriMar 24, 2017
    affected < 2.4.1-24.39.67.1fixed 2.4.1-24.39.67.1

    Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.

  • CVE-2017-5335HigMar 24, 2017
    affected < 2.4.1-24.39.67.1fixed 2.4.1-24.39.67.1

    The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate.

  • CVE-2015-4000LowMay 21, 2015
    affected < 2.4.1-24.39.57.1fixed 2.4.1-24.39.57.1

    The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by D

  • CVE-2015-2806Apr 10, 2015
    affected < 2.4.1-24.39.60.1fixed 2.4.1-24.39.60.1

    Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.