CVE-2017-5336

Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-03-24 15:59

Updated : 2024-02-04 19:11


NVD link : CVE-2017-5336

Mitre link : CVE-2017-5336

CVE.ORG link : CVE-2017-5336


JSON object : View

Products Affected

gnu

  • gnutls

opensuse

  • leap
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer