Lucene search

K
archlinuxArchLinuxASA-201703-16
HistoryMar 20, 2017 - 12:00 a.m.

[ASA-201703-16] mbedtls: arbitrary code execution

2017-03-2000:00:00
security.archlinux.org
19

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.054

Percentile

93.3%

Arch Linux Security Advisory ASA-201703-16

Severity: Critical
Date : 2017-03-20
CVE-ID : CVE-2017-2784
Package : mbedtls
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-198

Summary

The package mbedtls before version 2.4.2-1 is vulnerable to arbitrary
code execution.

Resolution

Upgrade to 2.4.2-1.

pacman -Syu “mbedtls>=2.4.2-1”

The problem has been fixed upstream in version 2.4.2.

Workaround

None.

Description

A security issue has been found in mbed TLS < 2.4.2. If a malicious
peer supplies a certificate with a specially crafted secp224k1 public
key, then an attacker can cause the server or client to attempt to free
block of memory held on stack. Depending on the platform, this could
result in a Denial of Service (client crash) or potentially could be
exploited to allow remote code execution with the same privileges as
the host application.

Impact

A remote attacker can cause a denial of service or execute arbitrary
code on the affected host via a crafted certificate.

References

https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-01
https://security.archlinux.org/CVE-2017-2784

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanymbedtls< 2.4.2-1UNKNOWN

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.054

Percentile

93.3%