CVE-2008-2377
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
08/08/2008
Last modified:
09/04/2025
Description
Use-after-free vulnerability in the _gnutls_handshake_hash_buffers_clear function in lib/gnutls_handshake.c in libgnutls in GnuTLS 2.3.5 through 2.4.0 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via TLS transmission of data that is improperly used when the peer calls gnutls_handshake within a normal session, leading to attempted access to a deallocated libgcrypt handle.
Impact
Base Score 2.0
7.60
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gnu:gnutls:2.3.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:gnutls:2.3.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:gnutls:2.3.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:gnutls:2.3.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:gnutls:2.3.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:gnutls:2.4.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/2947
- http://secunia.com/advisories/31505
- http://www.gnu.org/software/gnutls/security.html
- http://www.nabble.com/Details-on-the-gnutls_handshake-local-crash-problem--GNUTLS-SA-2008-2--td18205022.html
- http://www.securityfocus.com/bid/30713
- http://www.vupen.com/english/advisories/2008/2398
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44486
- https://issues.rpath.com/browse/RPL-2650
- http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/2947
- http://secunia.com/advisories/31505
- http://www.gnu.org/software/gnutls/security.html
- http://www.nabble.com/Details-on-the-gnutls_handshake-local-crash-problem--GNUTLS-SA-2008-2--td18205022.html
- http://www.securityfocus.com/bid/30713
- http://www.vupen.com/english/advisories/2008/2398
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44486
- https://issues.rpath.com/browse/RPL-2650



