SSL: Server Hello Session ID Overflow

This signature detects overlarge Session ID's in a Server Hello message. A successful attack could result in arbitrary code execution with the privileges of the receiving client process, possibly root.

Extended Description

Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.

Affected Products

Gnu gnutls

Short Name
SSL:SERVER-HELLO-SESSION-ID-OF
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
SSL
Keywords
CVE-2014-3466 Hello ID Overflow Server Session bid:67741
Release Date
06/04/2014
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Gnu

CVSS Score

6.8

Found a potential security threat?