| Vulnerability Name: | CVE-2015-5291 (CCN-108114) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Assigned: | 2015-11-02 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Published: | 2015-11-02 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Updated: | 2019-06-19 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Summary: | Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long hostname to the server name indication (SNI) extension, which is not properly handled when creating a ClientHello message. Note: this identifier has been SPLIT per ADT3 due to different affected version ranges. See CVE-2015-8036 for the session ticket issue that was introduced in 1.3.0. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 6.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) 5.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2015-5291 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2015-e22bb33731 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2015-30 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2015-7f939b3af5 Source: SUSE Type: Mailing List, Third Party Advisory openSUSE-SU-2015:2257 Source: SUSE Type: Mailing List, Third Party Advisory openSUSE-SU-2015:2371 Source: DEBIAN Type: Third Party Advisory DSA-3468 Source: XF Type: UNKNOWN polarssl-cve20155291-bo(108114) Source: MISC Type: Third Party Advisory https://guidovranken.files.wordpress.com/2015/10/cve-2015-5291.pdf Source: MISC Type: Third Party Advisory https://guidovranken.wordpress.com/2015/10/07/cve-2015-5291/ Source: GENTOO Type: Third Party Advisory GLSA-201706-18 Source: CCN Type: mbed TLS Security Advisory 2015-01 Remote attack on clients using session tickets or SNI Source: CONFIRM Type: Vendor Advisory https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2015-01 Source: CCN Type: WhiteSource Vulnerability Database CVE-2015-5291 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||