In ARM mbed TLS before 2.7.0, there is a bounds-check bypass through an integer overflow in PSK identity parsing in the ssl_parse_client_psk_identity() function in library/ssl_srv.c.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/103055 | Third Party Advisory VDB Entry |
https://github.com/ARMmbed/mbedtls/blob/master/ChangeLog | Third Party Advisory |
https://github.com/ARMmbed/mbedtls/commit/83c9f495ffe70c7dd280b41fdfd4881485a3bc28 | Patch Third Party Advisory |
https://security.gentoo.org/glsa/201804-19 | Third Party Advisory |
https://usn.ubuntu.com/4267-1/ | |
https://www.debian.org/security/2018/dsa-4138 | Third Party Advisory |
https://www.debian.org/security/2018/dsa-4147 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-02-14 17:29
Updated : 2020-02-10 16:15
NVD link : CVE-2017-18187
Mitre link : CVE-2017-18187
CVE.ORG link : CVE-2017-18187
JSON object : View
Products Affected
debian
- debian_linux
arm
- mbed_tls
CWE
CWE-190
Integer Overflow or Wraparound