Name | CVE-2017-2784 |
Description | An exploitable free of a stack pointer vulnerability exists in the x509 certificate parsing code of ARM mbed TLS before 1.3.19, 2.x before 2.1.7, and 2.4.x before 2.4.2. A specially crafted x509 certificate, when parsed by mbed TLS library, can cause an invalid free of a stack pointer leading to a potential remote code execution. In order to exploit this vulnerability, an attacker can act as either a client or a server on a network to deliver malicious x509 certificates to vulnerable applications. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 857560, 857561 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
mbedtls (PTS) | bullseye | 2.16.9-0.1 | fixed |
bookworm | 2.28.3-1 | fixed | |
trixie | 2.28.8-1 | fixed | |
sid | 3.6.2-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
mbedtls | source | (unstable) | 2.4.2-1 | 857560 | ||
polarssl | source | wheezy | (not affected) | |||
polarssl | source | jessie | 1.3.9-2.1+deb8u2 | |||
polarssl | source | (unstable) | (unfixed) | 857561 |
[wheezy] - polarssl <not-affected> (Vulnerable code not present)
https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-01
Wheezy do not have any elliptic curve functionality. Jessie is affected however.