296,172
Total vulnerabilities in the database
The gnutls_x509_crt_get_serial function in the GnuTLS library before 1.2.1, when running on big-endian, 64-bit platforms, calls the asn1_read_value with a pointer to the wrong data type and the wrong length value, which allows remote attackers to bypass the certificate revocation list (CRL) check and cause a stack-based buffer overflow via a crafted X.509 certificate, related to extraction of a serial number.
Software | From | Fixed in |
---|---|---|
gnu / gnutls | - | 1.2.0.x |
gnu / gnutls | 1.1.14 | 1.1.14.x |
gnu / gnutls | 1.1.21 | 1.1.21.x |
gnu / gnutls | 1.0.20 | 1.0.20.x |
gnu / gnutls | 1.0.17 | 1.0.17.x |
gnu / gnutls | 1.0.24 | 1.0.24.x |
gnu / gnutls | 1.0.21 | 1.0.21.x |
gnu / gnutls | 1.0.16 | 1.0.16.x |
gnu / gnutls | 1.1.20 | 1.1.20.x |
gnu / gnutls | 1.1.22 | 1.1.22.x |
gnu / gnutls | 1.0.19 | 1.0.19.x |
gnu / gnutls | 1.1.19 | 1.1.19.x |
gnu / gnutls | 1.1.18 | 1.1.18.x |
gnu / gnutls | 1.1.13 | 1.1.13.x |
gnu / gnutls | 1.0.18 | 1.0.18.x |
gnu / gnutls | 1.0.25 | 1.0.25.x |
gnu / gnutls | 1.1.15 | 1.1.15.x |
gnu / gnutls | 1.0.23 | 1.0.23.x |
gnu / gnutls | 1.1.23 | 1.1.23.x |
gnu / gnutls | 1.1.16 | 1.1.16.x |
gnu / gnutls | 1.0.22 | 1.0.22.x |
gnu / gnutls | 1.1.17 | 1.1.17.x |