First published: Mon Nov 02 2015(Updated: )
Heap-based buffer overflow in ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long session ticket name to the session ticket extension, which is not properly handled when creating a ClientHello message to resume a session. NOTE: this identifier was SPLIT from CVE-2015-5291 per ADT3 due to different affected version ranges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
mbed TLS | >=1.3.0<1.3.14 | |
mbed TLS | >=2.0.0<2.1.2 | |
PolarSSL | <=1.2.17 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
Red Hat Fedora | =21 | |
openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8036 is classified as a critical vulnerability due to its potential to cause client crashes and arbitrary code execution.
To fix CVE-2015-8036, upgrade to mbed TLS version 1.3.14 or higher, or version 2.1.2 or higher.
CVE-2015-8036 affects mbed TLS versions prior to 1.3.14 and 2.x versions prior to 2.1.2, along with older versions of PolarSSL.
Yes, CVE-2015-8036 can be exploited remotely by sending specially crafted session ticket names to the server.
CVE-2015-8036 is a heap-based buffer overflow vulnerability.