This indicates an attack attempt against an Memory Corruption vulnerability in GnuTLS.
The vulnerability is due to insufficient input validation in the application when handling a crafted SSL packet. A remote attacker can exploit this to execute arbitrary code within the context of the application, via a crafted SSL request.
GnuTLS 3.3.x prior to 3.3.26
GnuTLS 3.5.x prior to 3.5.8
System Compromise: Remote attackers can gain control of vulnerable systems.
Apply the most recent upgrade or patch from the vendor.