First published: Tue Apr 10 2018(Updated: )
ARM mbed TLS before 2.1.11, before 2.7.2, and before 2.8.0 has a buffer over-read in ssl_parse_server_psk_hint() that could cause a crash on invalid input.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ARM mbed TLS | <2.1.11 | |
ARM mbed TLS | >=2.7.0<2.7.2 | |
ARM mbed TLS | =2.8.0-rc1 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-9989 is a vulnerability in ARM mbed TLS before version 2.1.11, before version 2.7.2, and before version 2.8.0 that could cause a crash on invalid input due to a buffer over-read in ssl_parse_server_psk_hint().
CVE-2018-9989 has a severity value of 7.5, which is considered high.
ARM mbed TLS versions before 2.1.11, before 2.7.2, and before 2.8.0 are affected by CVE-2018-9989.
To fix CVE-2018-9989, it is recommended to update ARM mbed TLS to version 2.1.11 or later.
CVE-2018-9989 belongs to CWE category 125, which is Buffer Over-read.