First published: Wed Feb 05 2020(Updated: )
It was discovered that mbedtls has a bounds-check bypass through an integer overflow that can be used by an attacked to execute arbitrary code or cause a denial of service. (CVE-2017-18187) It was discovered that mbedtls has a vulnerability where an attacker could execute arbitrary code or cause a denial of service (buffer overflow) via a crafted certificate chain that is mishandled during RSASSA-PSS signature verification within a TLS or DTLS session. (CVE-2018-0487) It was discovered that mbedtls has a vulnerability where an attacker could execute arbitrary code or cause a denial of service (heap corruption) via a crafted application packet within a TLS or DTLS session. (CVE-2018-0488) It was discovered that mbedtls has a vulnerability that allows remote attackers to achieve partial plaintext recovery (for a CBC based ciphersuite) via a timing-based side-channel attack. (CVE-2018-0497) It was discovered that mbedtls has a vulnerability that allows local users to achieve partial plaintext recovery (for a CBC based ciphersuite) via a cache-based side-channel attack. (CVE-2018-0498)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libmbedcrypto0 | <2.2.1-2ubuntu0.3 | 2.2.1-2ubuntu0.3 |
=16.04 | ||
All of | ||
ubuntu/libmbedtls10 | <2.2.1-2ubuntu0.3 | 2.2.1-2ubuntu0.3 |
=16.04 | ||
All of | ||
ubuntu/libmbedx509-0 | <2.2.1-2ubuntu0.3 | 2.2.1-2ubuntu0.3 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for this issue is USN-4267-1.
The severity of USN-4267-1 is not specified.
An attacker can exploit the vulnerability in USN-4267-1 to execute arbitrary code or cause a denial of service.
To fix the vulnerability described in USN-4267-1, update the affected software to version 2.2.1-2ubuntu0.3 or later.
You can find more information about USN-4267-1 on the Ubuntu website.