CVE-2017-5337

Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-03-24 15:59

Updated : 2024-02-04 19:11


NVD link : CVE-2017-5337

Mitre link : CVE-2017-5337

CVE.ORG link : CVE-2017-5337


JSON object : View

Products Affected

gnu

  • gnutls

opensuse

  • leap
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer