Vulnerability Description
The "record packet parsing" in GnuTLS 1.2 before 1.2.3 and 1.0 before 1.0.25 allows remote attackers to cause a denial of service, possibly related to padding bytes in gnutils_cipher.c.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Gnutls | 1.0.18 |
References
- http://lists.gnupg.org/pipermail/gnutls-dev/2005-April/000858.html
- http://secunia.com/advisories/15193
- http://securitytracker.com/id?1013861
- http://www.osvdb.org/16054
- http://www.redhat.com/support/errata/RHSA-2005-430.html
- http://www.securityfocus.com/bid/13477
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20328
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- http://lists.gnupg.org/pipermail/gnutls-dev/2005-April/000858.html
- http://secunia.com/advisories/15193
- http://securitytracker.com/id?1013861
- http://www.osvdb.org/16054
- http://www.redhat.com/support/errata/RHSA-2005-430.html
- http://www.securityfocus.com/bid/13477
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20328
FAQ
What is CVE-2005-1431?
CVE-2005-1431 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The "record packet parsing" in GnuTLS 1.2 before 1.2.3 and 1.0 before 1.0.25 allows remote attackers to cause a denial of service, possibly related to padding bytes in gnutils_cipher.c.
How severe is CVE-2005-1431?
CVE-2005-1431 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-1431?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Gnutls.