ALT-PU-2018-1396-1
Closed vulnerabilities
Published: 2018-02-14
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2017-18187
In ARM mbed TLS before 2.7.0, there is a bounds-check bypass through an integer overflow in PSK identity parsing in the ssl_parse_client_psk_identity() function in library/ssl_srv.c.
Severity: HIGH (7.5)
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: CRITICAL (9.8)
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References:
- http://www.securityfocus.com/bid/103055
- https://github.com/ARMmbed/mbedtls/blob/master/ChangeLog
- https://github.com/ARMmbed/mbedtls/commit/83c9f495ffe70c7dd280b41fdfd4881485a3bc28
- https://security.gentoo.org/glsa/201804-19
- https://usn.ubuntu.com/4267-1/
- https://www.debian.org/security/2018/dsa-4138
- https://www.debian.org/security/2018/dsa-4147
- http://www.securityfocus.com/bid/103055
- https://github.com/ARMmbed/mbedtls/blob/master/ChangeLog
- https://github.com/ARMmbed/mbedtls/commit/83c9f495ffe70c7dd280b41fdfd4881485a3bc28
- https://security.gentoo.org/glsa/201804-19
- https://usn.ubuntu.com/4267-1/
- https://www.debian.org/security/2018/dsa-4138
- https://www.debian.org/security/2018/dsa-4147
Published: 2018-02-13
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2018-0487
ARM mbed TLS before 1.3.22, before 2.1.10, and before 2.7.0 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via a crafted certificate chain that is mishandled during RSASSA-PSS signature verification within a TLS or DTLS session.
Severity: HIGH (7.5)
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: CRITICAL (9.8)
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References:
- http://www.securityfocus.com/bid/103056
- https://security.gentoo.org/glsa/201804-19
- https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-01
- https://usn.ubuntu.com/4267-1/
- https://www.debian.org/security/2018/dsa-4138
- https://www.debian.org/security/2018/dsa-4147
- http://www.securityfocus.com/bid/103056
- https://security.gentoo.org/glsa/201804-19
- https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-01
- https://usn.ubuntu.com/4267-1/
- https://www.debian.org/security/2018/dsa-4138
- https://www.debian.org/security/2018/dsa-4147
Published: 2018-02-13
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2018-0488
ARM mbed TLS before 1.3.22, before 2.1.10, and before 2.7.0, when the truncated HMAC extension and CBC are used, allows remote attackers to execute arbitrary code or cause a denial of service (heap corruption) via a crafted application packet within a TLS or DTLS session.
Severity: HIGH (7.5)
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: CRITICAL (9.8)
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References:
- http://www.securityfocus.com/bid/103057
- https://security.gentoo.org/glsa/201804-19
- https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-01
- https://usn.ubuntu.com/4267-1/
- https://www.debian.org/security/2018/dsa-4138
- https://www.debian.org/security/2018/dsa-4147
- http://www.securityfocus.com/bid/103057
- https://security.gentoo.org/glsa/201804-19
- https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-01
- https://usn.ubuntu.com/4267-1/
- https://www.debian.org/security/2018/dsa-4138
- https://www.debian.org/security/2018/dsa-4147