First published: Fri Aug 16 2013(Updated: )
From the PolarSSL Security Advisory 2013-03 advisory: "A bug in the logic of the parsing of PEM encoded certificates in x509parse_crt() can result in an infinite loop, thus hogging processing power." A remote attacker could use this flaw to make a TLS/SSL server using PolarSSL consume an excessive amount of CPU. This issue was corrected in PolarSSL versions 1.1.7 and 1.2.8. (Versions prior to these are affected.) External References: <a href="https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2013-03">https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2013-03</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Polarssl Polarssl | =1.1.0 | |
Polarssl Polarssl | =1.1.0-rc0 | |
Polarssl Polarssl | =1.1.0-rc1 | |
Polarssl Polarssl | =1.1.1 | |
Polarssl Polarssl | =1.1.2 | |
Polarssl Polarssl | =1.1.3 | |
Polarssl Polarssl | =1.1.4 | |
Polarssl Polarssl | =1.1.5 | |
Polarssl Polarssl | =1.1.6 | |
Polarssl Polarssl | =1.2.0 | |
Polarssl Polarssl | =1.2.1 | |
Polarssl Polarssl | =1.2.2 | |
Polarssl Polarssl | =1.2.3 | |
Polarssl Polarssl | =1.2.4 | |
Polarssl Polarssl | =1.2.5 | |
Polarssl Polarssl | =1.2.6 | |
Polarssl Polarssl | =1.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.