CVE-2017-5337
24.03.2017, 15:59
Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.Enginsight
Vendor | Product | Version |
---|---|---|
opensuse | leap | 42.1 |
opensuse | leap | 42.2 |
gnu | gnutls | 𝑥 ≤ 3.3.25 |
gnu | gnutls | 3.5.0 |
gnu | gnutls | 3.5.1 |
gnu | gnutls | 3.5.2 |
gnu | gnutls | 3.5.3 |
gnu | gnutls | 3.5.4 |
gnu | gnutls | 3.5.5 |
gnu | gnutls | 3.5.6 |
gnu | gnutls | 3.5.7 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
gnutls26 |
| ||||||||||||||||||
gnutls28 |
|
Common Weakness Enumeration
References