|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200505-04] GnuTLS: Denial of Service vulnerability Vulnerability Assessment Details
|
[GLSA-200505-04] GnuTLS: Denial of Service vulnerability |
||
GnuTLS: Denial of Service vulnerability Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200505-04 (GnuTLS: Denial of Service vulnerability) A vulnerability has been discovered in the record packet parsing in the GnuTLS library. Additionally, a flaw was also found in the RSA key export functionality. Impact A remote attacker could exploit this vulnerability and cause a Denial of Service to any application that utilizes the GnuTLS library. Workaround There is no known workaround at this time. References: http://lists.gnupg.org/pipermail/gnutls-dev/2005-April/000858.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1431 Solution: All GnuTLS users should remove the existing installation and upgrade to the latest version: # emerge --sync # emerge --unmerge gnutls # emerge --ask --oneshot --verbose net-libs/gnutls Due to small API changes with the previous version, please do the following to ensure your applications are using the latest GnuTLS that you just emerged. # revdep-rebuild --soname-regexp libgnutls.so.1[0-1] Previously exported RSA keys can be fixed by executing the following command on the key files: # certtool -k infile outfile Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: (C) 2005 Michel Arboi |
||
Cables, Connectors |
Impulse Firecracker 24 Rev 2.1 2MB 24bit Graphics card for Amiga 2000 3000 4000
$175.00
Mini External OLED AMIGA Gotek Floppy Drive Emulator For Amiga 500/500+/600/1200
$37.41
Commodore Amiga 1080 Color Monitor Read Description
$150.00
Commodore Amiga 1200 Recapped NTSC 68060 FPU MMU Indivision AGA Mk3 HDMI 128MB
$1449.99
Amiga A500 NTSC, 1 MB Chip RAM, HDMI, Wireless Mouse, Original Box
$360.00
Commodore Amiga 1200 A1200 PAL Motherboard Recapped Works 1D4 US Seller Refurb
$399.99
Utilities Unlimited Emplant for AMIGA A2000 A3000 A4000
$475.00
Commodore Amiga KKQ-E94YC Keyboard for A2000 / A2500
$249.00
TeensyROM Cartridge for Commodore 64/128: MIDI, Fastload, Emulation, and Network
$65.00
Amiga Gotek V3.42 External Ivory & BIEGE + 0.96 OLED + Rotary with DF1/ 23p Lead
$88.98
|
||
No Discussions have been posted on this vulnerability. |