6.8
CVSSv2

CVE-2015-8036

Published: 02/11/2015 Updated: 19/06/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in ARM mbed TLS (formerly PolarSSL) 1.3.x prior to 1.3.14 and 2.x prior to 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long session ticket name to the session ticket extension, which is not properly handled when creating a ClientHello message to resume a session. NOTE: this identifier was SPLIT from CVE-2015-5291 per ADT3 due to different affected version ranges.

Vulnerable Product Search on Vulmon Subscribe to Product

arm mbed tls

polarssl polarssl

fedoraproject fedora 21

debian debian linux 7.0

debian debian linux 8.0

opensuse opensuse 13.2

Vendor Advisories

Debian Bug report logs - #801413 polarssl: CVE-2015-5291: Remote attack on clients using session tickets or SNI Package: src:polarssl; Maintainer for src:polarssl is Roland Stigge <stigge@antcomde>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 9 Oct 2015 20:03:01 UTC Severity: grave Tags: fixed- ...
It was discovered that polarssl, a library providing SSL and TLS support, contained two heap-based buffer overflows that could allow a remote attacker to trigger denial of service (via application crash) or arbitrary code execution For the oldstable distribution (wheezy), these problems have been fixed in version 129-1~deb7u6 For the stable dis ...