First published: Wed Feb 14 2018(Updated: )
In ARM mbed TLS before 2.7.0, there is a bounds-check bypass through an integer overflow in PSK identity parsing in the ssl_parse_client_psk_identity() function in library/ssl_srv.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ARM mbed TLS | <2.7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
ubuntu/mbedtls | <2.4.2-1+<2.7.0-2 | 2.4.2-1+ 2.7.0-2 |
ubuntu/mbedtls | <2.2.1-2ubuntu0.3 | 2.2.1-2ubuntu0.3 |
ubuntu/polarssl | <1.3.9-2.1+ | 1.3.9-2.1+ |
debian/mbedtls | 2.16.9-0.1 2.28.3-1 2.28.8-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18187 is a vulnerability in ARM mbed TLS before 2.7.0 that allows a bounds-check bypass through an integer overflow in PSK identity parsing.
CVE-2017-18187 has a severity level of 9.8, which is considered critical.
CVE-2017-18187 affects ARM mbed TLS versions before 2.7.0.
To fix CVE-2017-18187, you should upgrade to ARM mbed TLS version 2.7.0 or later.
You can find more information about CVE-2017-18187 on the SecurityFocus website and the ARM mbed TLS GitHub repository.