Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-35409
HistoryJul 15, 2022 - 12:00 a.m.

CVE-2022-35409

2022-07-1500:00:00
ubuntu.com
ubuntu.com
18
mbed tls
buffer over-read
dtls server
information disclosure
unix

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

EPSS

0.001

Percentile

48.7%

An issue was discovered in Mbed TLS before 2.28.1 and 3.x before 3.2.0. In
some configurations, an unauthenticated attacker can send an invalid
ClientHello message to a DTLS server that causes a heap-based buffer
over-read of up to 255 bytes. This can cause a server crash or possibly
information disclosure based on error responses. Affected configurations
have MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE enabled and
MBEDTLS_SSL_IN_CONTENT_LEN less than a threshold that depends on the
configuration: 258 bytes if using mbedtls_ssl_cookie_check, and possibly up
to 571 bytes with a custom cookie check function.

OSVersionArchitecturePackageVersionFilename
ubuntu22.04noarchmbedtls< anyUNKNOWN
ubuntu24.04noarchmbedtls< anyUNKNOWN

References

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

EPSS

0.001

Percentile

48.7%