It's actually a memory corruption leading to remote code execution, though it's not clear how reliable the RCE is. (Possibly, if you can heap spray the client?)
Technical analysis here: http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/. Affects clients only. On Mon, Jun 2, 2014 at 4:32 PM, Doug Barton <do...@dougbarton.us> wrote: > I'm noticing this in today's Ubuntu updates: > > SECURITY UPDATE: memory corruption due to server hello parsing > -debian/patches/CVE-2014-3466.patch: validate session_id_len in > lib/gnutls_handshake.c > > I haven't looked at the code, and the CVE referenced is simply reserved, > not populated yet. But that description sounds like it's at best a very > close cousin to our friend heartbleed ... > > curious, > > Doug > > _______________________________________________ > Gnupg-users mailing list > Gnupg-users@gnupg.org > http://lists.gnupg.org/mailman/listinfo/gnupg-users > -- David Tomaschik OpenPGP: 0x5DEA789B http://systemoverlord.com da...@systemoverlord.com
_______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users