In ARM mbed TLS before 2.7.0, there is a bounds-check bypass through an integer overflow in PSK identity parsing in the ssl_parse_client_psk_identity() function in library/ssl_srv.c.
References
Link | Resource |
---|---|
https://github.com/ARMmbed/mbedtls/commit/83c9f495ffe70c7dd280b41fdfd4881485a3bc28 | Patch Third Party Advisory |
https://github.com/ARMmbed/mbedtls/blob/master/ChangeLog | Third Party Advisory |
http://www.securityfocus.com/bid/103055 | Third Party Advisory VDB Entry |
https://www.debian.org/security/2018/dsa-4138 | Third Party Advisory |
https://www.debian.org/security/2018/dsa-4147 | Third Party Advisory |
https://security.gentoo.org/glsa/201804-19 | Third Party Advisory |
https://usn.ubuntu.com/4267-1/ |
Information
Published : 2018-02-14 09:29
Updated : 2020-02-10 08:15
NVD link : CVE-2017-18187
Mitre link : CVE-2017-18187
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
debian
- debian_linux
arm
- mbed_tls