CVE-2017-5336

Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
debianCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 81%
VendorProductVersion
opensuseleap
42.1
opensuseleap
42.2
gnugnutls
𝑥
≤ 3.3.25
gnugnutls
3.5.0
gnugnutls
3.5.1
gnugnutls
3.5.2
gnugnutls
3.5.3
gnugnutls
3.5.4
gnugnutls
3.5.5
gnugnutls
3.5.6
gnugnutls
3.5.7
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gnutls28
bullseye
3.7.1-5+deb11u5
fixed
wheezy
no-dsa
bullseye (security)
3.7.1-5+deb11u6
fixed
bookworm
3.7.9-2+deb12u3
fixed
sid
3.8.6-2
fixed
trixie
3.8.6-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gnutls26
disco
dne
cosmic
dne
bionic
dne
artful
dne
zesty
dne
yakkety
dne
xenial
dne
trusty
Fixed 2.12.23-12ubuntu2.6
released
precise
Fixed 2.12.14-5ubuntu3.13
released
gnutls28
disco
Fixed 3.5.6-4ubuntu3
released
cosmic
Fixed 3.5.6-4ubuntu3
released
bionic
Fixed 3.5.6-4ubuntu3
released
artful
Fixed 3.5.6-4ubuntu3
released
zesty
Fixed 3.5.6-4ubuntu3
released
yakkety
Fixed 3.5.3-5ubuntu1.1
released
xenial
Fixed 3.4.10-4ubuntu1.2
released
trusty
dne
precise
ignored