First published: Mon Nov 02 2015(Updated: )
Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long hostname to the server name indication (SNI) extension, which is not properly handled when creating a ClientHello message. NOTE: this identifier has been SPLIT per ADT3 due to different affected version ranges. See CVE-2015-8036 for the session ticket issue that was introduced in 1.3.0.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
mbed TLS | >=1.3.0<1.3.14 | |
mbed TLS | >=2.0.0<2.1.2 | |
PolarSSL | >=1.0.0<1.2.17 | |
Debian | =7.0 | |
Debian | =8.0 | |
Fedora | =21 | |
Fedora | =22 | |
Fedora | =23 | |
openSUSE | =42.1 | |
openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5291 has a severity that can lead to denial of service and potentially arbitrary code execution.
To fix CVE-2015-5291, upgrade PolarSSL to version 1.2.17 or later, or upgrade mbed TLS to versions 1.3.14, 2.1.2 or later.
CVE-2015-5291 affects PolarSSL 1.x before 1.2.17 and mbed TLS versions 1.3.x before 1.3.14 and 2.x before 2.1.2.
Yes, CVE-2015-5291 can be exploited remotely via a long hostname to the Server Name Indication (SNI) extension.
CVE-2015-5291 is classified as a heap-based buffer overflow vulnerability.