First published: Sat Oct 26 2013(Updated: )
Buffer overflow in the ssl_read_record function in ssl_tls.c in PolarSSL before 1.1.8, when using TLS 1.1, might allow remote attackers to execute arbitrary code via a long packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PolarSSL | <=1.1.7 | |
PolarSSL | =1.0.0 | |
PolarSSL | =1.1.0 | |
PolarSSL | =1.1.0-rc0 | |
PolarSSL | =1.1.0-rc1 | |
PolarSSL | =1.1.1 | |
PolarSSL | =1.1.2 | |
PolarSSL | =1.1.3 | |
PolarSSL | =1.1.4 | |
PolarSSL | =1.1.5 | |
PolarSSL | =1.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5914 has a severity rating that indicates it could allow remote attackers to execute arbitrary code due to a buffer overflow.
To fix CVE-2013-5914, upgrade PolarSSL to version 1.1.8 or later.
CVE-2013-5914 affects PolarSSL versions up to 1.1.7 and specific earlier versions.
CVE-2013-5914 occurs in the ssl_read_record function within ssl_tls.c.
CVE-2013-5914 can be exploited via a long packet sent by remote attackers.