Heap-based buffer overflow in MatrixSSL before 3.8.6 allows remote attackers to execute arbitrary code via a crafted Subject Alt Name in an X.509 certificate.
References
Link | Resource |
---|---|
https://www.kb.cert.org/vuls/id/396440 | Third Party Advisory US Government Resource |
https://github.com/matrixssl/matrixssl/blob/3-8-6-open/CHANGES.md | Patch Release Notes Third Party Advisory |
http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/flawed-matrixssl-code-highlights-need-for-better-iot-update-practices/ | Technical Description Third Party Advisory |
http://www.securityfocus.com/bid/93498 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2017-01-05 14:59
Updated : 2017-01-06 07:14
NVD link : CVE-2016-6890
Mitre link : CVE-2016-6890
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
matrixssl
- matrixssl