| Vulnerability Name: | CVE-2015-8036 (CCN-108113) | ||||||||||||||||||||||||||||||||||||||||||||||||
| Assigned: | 2015-11-02 | ||||||||||||||||||||||||||||||||||||||||||||||||
| Published: | 2015-11-02 | ||||||||||||||||||||||||||||||||||||||||||||||||
| Updated: | 2019-06-19 | ||||||||||||||||||||||||||||||||||||||||||||||||
| Summary: | Heap-based buffer overflow in ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long session ticket name to the session ticket extension, which is not properly handled when creating a ClientHello message to resume a session. Note: this identifier was SPLIT from CVE-2015-5291 per ADT3 due to different affected version ranges. | ||||||||||||||||||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 6.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) 5.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2015-8036 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2015-30 Source: SUSE Type: Mailing List, Third Party Advisory openSUSE-SU-2016:1928 Source: DEBIAN Type: Mailing List, Third Party Advisory DSA-3468 Source: XF Type: UNKNOWN polarssl-cve20158036-bo(108113) Source: MISC Type: Third Party Advisory https://guidovranken.files.wordpress.com/2015/10/cve-2015-5291.pdf Source: MISC Type: Third Party Advisory https://guidovranken.wordpress.com/2015/10/07/cve-2015-5291/ Source: CCN Type: mbed TLS Security Advisory 2015-01 Remote attack on clients using session tickets or SNI Source: CONFIRM Type: Vendor Advisory https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2015-01 Source: CCN Type: WhiteSource Vulnerability Database CVE-2015-8036 | ||||||||||||||||||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||||||||||||||||||