Heap-based buffer overflow in MatrixSSL before 3.8.6 allows remote attackers to execute arbitrary code via a crafted Subject Alt Name in an X.509 certificate.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/93498 | Third Party Advisory VDB Entry |
http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/flawed-matrixssl-code-highlights-need-for-better-iot-update-practices/ | Technical Description Third Party Advisory |
https://github.com/matrixssl/matrixssl/blob/3-8-6-open/CHANGES.md | Patch Release Notes Third Party Advisory |
https://www.kb.cert.org/vuls/id/396440 | Third Party Advisory US Government Resource |
Configurations
History
No history.
Information
Published : 2017-01-05 22:59
Updated : 2024-02-04 19:11
NVD link : CVE-2016-6890
Mitre link : CVE-2016-6890
CVE.ORG link : CVE-2016-6890
JSON object : View
Products Affected
matrixssl
- matrixssl
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer