{"vuid":"VU#659209","idnumber":"659209","name":"GnuTLS Pad Length Denial of Service","keywords":["ssl","openssl","tls","gnutls"],"overview":"A vulnerability exists in GnuTLS that may allow a remote attacker to cause a denial of service.","clean_desc":"GnuTLS  contains a vulnerability in gnults-serv that may result in a denial of service when handling a sequence of specially crafted packets. According to CERT-FI Vulnerability Advisory on GnuTLS: We have found the flaw by doing complete TLS 1.0 handshake followed by a encrypted Client-Hello message to start abbreviated handshake. In this case the the Record Length field of the TLS Record containing the Client Hello contains erroneus value '8' triggering the bug. Note that this might not be the only way to reproduce the bug. Note that this issue may affect GnuTLS versions prior to 2.2.5 and also affects version 2.3.0.","impact":"A remote, unauthorized attacker may be able to cause a denial of service.","resolution":"Upgrade or Apply Patch\nGnuTLS has issued an upgrade and a patch to address this issue. See GnuTLS Security Advisory SA-2008-01 for more information. GnuTLS is included in various Linux and UNIX distributions. Please consult the relevant documentation of your distribution to obtain the appropriate updates.","workarounds":"","sysaffected":"","thanks":"This issue was reported in GnuTLS Security Advisory \nSA-2008-01\n. GnuTLS credits Ossi Herrala and Jukka Taimisto from the CROSS project at Codenomicon Ltd. for reporting this issue.","author":"This document was written by Chris Taschner.","public":["http://www.cert.fi/haavoittuvuudet/advisory-gnutls.html","http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00060.html","http://secunia.com/advisories/30287/","http://secunia.com/advisories/30330/"],"cveids":["CVE-2008-1950"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2008-03-27T02:31:40Z","publicdate":"2008-05-19T00:00:00Z","datefirstpublished":"2008-05-30T13:37:40Z","dateupdated":"2008-05-30T13:41:39Z","revision":16,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"20","cam_impact":"7","cam_easeofexploitation":"14","cam_attackeraccessrequired":"18","cam_scorecurrent":"16.5375","cam_scorecurrentwidelyknown":"19.845","cam_scorecurrentwidelyknownexploited":"33.075","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":16.5375,"vulnote":null}