6.8
CVSSv2

CVE-2015-5291

Published: 02/11/2015 Updated: 19/06/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in PolarSSL 1.x prior to 1.2.17 and ARM mbed TLS (formerly PolarSSL) 1.3.x prior to 1.3.14 and 2.x prior to 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long hostname to the server name indication (SNI) extension, which is not properly handled when creating a ClientHello message. NOTE: this identifier has been SPLIT per ADT3 due to different affected version ranges. See CVE-2015-8036 for the session ticket issue that was introduced in 1.3.0.

Vulnerable Product Search on Vulmon Subscribe to Product

arm mbed tls

polarssl polarssl

debian debian linux 7.0

debian debian linux 8.0

opensuse leap 42.1

fedoraproject fedora 21

fedoraproject fedora 22

fedoraproject fedora 23

opensuse opensuse 13.2

Vendor Advisories

Debian Bug report logs - #801413 polarssl: CVE-2015-5291: Remote attack on clients using session tickets or SNI Package: src:polarssl; Maintainer for src:polarssl is Roland Stigge <stigge@antcomde>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 9 Oct 2015 20:03:01 UTC Severity: grave Tags: fixed- ...
It was discovered that polarssl, a library providing SSL and TLS support, contained two heap-based buffer overflows that could allow a remote attacker to trigger denial of service (via application crash) or arbitrary code execution For the oldstable distribution (wheezy), these problems have been fixed in version 129-1~deb7u6 For the stable dis ...