First published: Mon Nov 02 2015(Updated: )
Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long hostname to the server name indication (SNI) extension, which is not properly handled when creating a ClientHello message. NOTE: this identifier has been SPLIT per ADT3 due to different affected version ranges. See CVE-2015-8036 for the session ticket issue that was introduced in 1.3.0.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ARM mbed TLS | >=1.3.0<1.3.14 | |
ARM mbed TLS | >=2.0.0<2.1.2 | |
Polarssl Polarssl | >=1.0.0<1.2.17 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Fedoraproject Fedora | =21 | |
Fedoraproject Fedora | =22 | |
Fedoraproject Fedora | =23 | |
openSUSE Leap | =42.1 | |
openSUSE openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.