ARM mbed TLS before 1.3.22, before 2.1.10, and before 2.7.0 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via a crafted certificate chain that is mishandled during RSASSA-PSS signature verification within a TLS or DTLS session.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/103056 | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201804-19 | Third Party Advisory |
https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-01 | Mitigation Vendor Advisory |
https://usn.ubuntu.com/4267-1/ | |
https://www.debian.org/security/2018/dsa-4138 | Third Party Advisory |
https://www.debian.org/security/2018/dsa-4147 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-02-13 15:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-0487
Mitre link : CVE-2018-0487
CVE.ORG link : CVE-2018-0487
JSON object : View
Products Affected
debian
- debian_linux
arm
- mbed_tls
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer