Intrusion Prevention



This indicates an attack attempt against an Memory Corruption vulnerability in GnuTLS.
The vulnerability is due to insufficient input validation in the application when handling a crafted SSL packet. A remote attacker can exploit this to execute arbitrary code within the context of the application, via a crafted SSL request.

Affected Products

GnuTLS 3.3.x prior to 3.3.26
GnuTLS 3.5.x prior to 3.5.8


System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor.

CVE References