An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). The calculations performed by mbedtls_mpi_exp_mod are not limited; thus, supplying overly large parameters could lead to denial of service when generating Diffie-Hellman key pairs.
References
Link | Resource |
---|---|
https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.9 | Release Notes Third Party Advisory |
https://github.com/ARMmbed/mbedtls/releases/tag/v2.25.0 | Release Notes Third Party Advisory |
https://github.com/ARMmbed/mbedtls/releases/tag/v2.7.18 | Release Notes Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-756638.pdf | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/11/msg00021.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
|
Information
Published : 2021-08-22 19:15
Updated : 2023-01-11 09:00
NVD link : CVE-2020-36475
Mitre link : CVE-2020-36475
JSON object : View
CWE
CWE-131
Incorrect Calculation of Buffer Size
Products Affected
siemens
- simatic_rtu3030c_firmware
- logo\!_cmr2040_firmware
- simatic_rtu3000c_firmware
- simatic_rtu3000c
- simatic_rtu3041c
- logo\!_cmr2040
- simatic_rtu3030c
- logo\!_cmr2020
- logo\!_cmr2020_firmware
- simatic_rtu3031c
- simatic_rtu3031c_firmware
- simatic_rtu3041c_firmware
arm
- mbed_tls
debian
- debian_linux