{"id":"CVE-2014-3466","details":"Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.","modified":"2026-01-27T04:12:40.873299Z","published":"2014-06-03T14:55:10Z","withdrawn":"2026-01-27T04:12:40.873299Z","related":["MGASA-2014-0248","SUSE-SU-2015:0675-1","openSUSE-SU-2024:10105-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-0594.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-0595.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-0684.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-0815.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/58340"},{"type":"ADVISORY","url":"http://secunia.com/advisories/58598"},{"type":"ADVISORY","url":"http://secunia.com/advisories/58601"},{"type":"ADVISORY","url":"http://secunia.com/advisories/58642"},{"type":"ADVISORY","url":"http://secunia.com/advisories/59016"},{"type":"ADVISORY","url":"http://secunia.com/advisories/59021"},{"type":"ADVISORY","url":"http://secunia.com/advisories/59057"},{"type":"ADVISORY","url":"http://secunia.com/advisories/59086"},{"type":"ADVISORY","url":"http://secunia.com/advisories/59408"},{"type":"ADVISORY","url":"http://secunia.com/advisories/59838"},{"type":"ADVISORY","url":"http://secunia.com/advisories/60384"},{"type":"ADVISORY","url":"http://www.debian.org/security/2014/dsa-2944"},{"type":"ADVISORY","url":"http://www.gnutls.org/security.html"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2229-1"},{"type":"WEB","url":"http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/"},{"type":"FIX","url":"https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1101932"},{"type":"WEB","url":"http://linux.oracle.com/errata/ELSA-2014-0594.html"},{"type":"WEB","url":"http://linux.oracle.com/errata/ELSA-2014-0595.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html"},{"type":"WEB","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21678776"},{"type":"WEB","url":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155"},{"type":"WEB","url":"http://www.novell.com/support/kb/doc.php?id=7015302"},{"type":"WEB","url":"http://www.novell.com/support/kb/doc.php?id=7015303"},{"type":"WEB","url":"http://www.securityfocus.com/bid/67741"},{"type":"WEB","url":"http://www.securitytracker.com/id/1030314"}],"schema_version":"1.7.3"}