![](/assets/img/cve_300x82_sin_bg.png)
CVE-2011-4574
https://notcve.org/view.php?id=CVE-2011-4574
27 Oct 2021 — PolarSSL versions prior to v1.1 use the HAVEGE random number generation algorithm. At its heart, this uses timing information based on the processor's high resolution timer (the RDTSC instruction). This instruction can be virtualized, and some virtual machine hosts have chosen to disable this instruction, returning 0s or predictable results. PolarSSL versiones anteriores a v1.1, usan el algoritmo de generación de números aleatorios HAVEGE. En su esencia, éste usa información de tiempo basada en el temporiza... • https://tls.mbed.org/tech-updates/security-advisories/polarssl-security-advisory-2011-02 • CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2015-8036 – Debian Security Advisory 3468-1
https://notcve.org/view.php?id=CVE-2015-8036
02 Nov 2015 — Heap-based buffer overflow in ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long session ticket name to the session ticket extension, which is not properly handled when creating a ClientHello message to resume a session. NOTE: this identifier was SPLIT from CVE-2015-5291 per ADT3 due to different affected version ranges. Vulnerabilidad de desbordamiento de buffer basado... • http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169625.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2014-9744
https://notcve.org/view.php?id=CVE-2014-9744
24 Aug 2015 — Memory leak in PolarSSL before 1.3.9 allows remote attackers to cause a denial of service (memory consumption) via a large number of ClientHello messages. NOTE: this identifier was SPLIT from CVE-2014-8628 per ADT3 due to different affected versions. Vulnerabilidad de fuga de memoria en PolarSSL en versiones anteriores a 1.3.9, permite a atacantes remotos causar una denegación de servicio (consumo de memoria) a través de una gran cantidad de mensajes CLientHello. NOTA: este identificador ha sido SEPARADO de... • http://lists.opensuse.org/opensuse-updates/2014-11/msg00079.html • CWE-399: Resource Management Errors •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2014-8628 – Debian Security Advisory 3116-1
https://notcve.org/view.php?id=CVE-2014-8628
31 Dec 2014 — Memory leak in PolarSSL before 1.2.12 and 1.3.x before 1.3.9 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted X.509 certificates. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2014-9744 for the ClientHello message issue. Vulnerabilidad de fuga de memoria en PolarSSL en versiones anteriores a 1.2.12 y 1.3.x en versiones anteriores a 1.3.9, permite a atacantes remotos causar una denegación de servicio (consumo d... • http://lists.opensuse.org/opensuse-updates/2014-11/msg00079.html • CWE-399: Resource Management Errors •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2014-4911 – Debian Security Advisory 2981-1
https://notcve.org/view.php?id=CVE-2014-4911
20 Jul 2014 — The ssl_decrypt_buf function in library/ssl_tls.c in PolarSSL before 1.2.11 and 1.3.x before 1.3.8 allows remote attackers to cause a denial of service (crash) via vectors related to the GCM ciphersuites, as demonstrated using the Codenomicon Defensics toolkit. La función ssl_decrypt_buf en library/ssl_tls.c en PolarSSL anterior a 1.2.11 y 1.3.x anterior a 1.3.8 permite a atacantes remotos causar una denegación de servicio (caída) a través de vectores relacionados con los suites de cifrado GCM, tal y como f... • http://secunia.com/advisories/60215 • CWE-310: Cryptographic Issues •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-5914 – Debian Security Advisory 2782-1
https://notcve.org/view.php?id=CVE-2013-5914
21 Oct 2013 — Buffer overflow in the ssl_read_record function in ssl_tls.c in PolarSSL before 1.1.8, when using TLS 1.1, might allow remote attackers to execute arbitrary code via a long packet. Buffer overflow en la funcón ssl_read_record en ssl_tls.c de PolarSSL anterior a la versión 1.1.8, cuando se utiliza TLS 1.1, podría permitir a atacantes remotos ejecutar código arbitrario a través de un paquete largo. Multiple security issues have been discovered in PolarSSL, a lightweight crypto and SSL/TLS library. • http://www.debian.org/security/2013/dsa-2782 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-5915 – Gentoo Linux Security Advisory 201310-10
https://notcve.org/view.php?id=CVE-2013-5915
04 Oct 2013 — The RSA-CRT implementation in PolarSSL before 1.2.9 does not properly perform Montgomery multiplication, which might allow remote attackers to conduct a timing side-channel attack and retrieve RSA private keys. La implementación RSA-CRT- en PolarSSL anterior a la versión 1.2.9 no realiza adecuadamente la multiplicación Montgomery, lo que podría permitir a atacantes llevar a cabo un ataque timing side-channel y conseguir las llaves privadas RSA. Multiple vulnerabilities have been found in PolarSSL, the worst... • http://lists.fedoraproject.org/pipermail/package-announce/2013-October/118758.html • CWE-310: Cryptographic Issues •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-1621 – Gentoo Linux Security Advisory 201310-10
https://notcve.org/view.php?id=CVE-2013-1621
08 Feb 2013 — Array index error in the SSL module in PolarSSL before 1.2.5 might allow remote attackers to cause a denial of service via vectors involving a crafted padding-length value during validation of CBC padding in a TLS session, a different vulnerability than CVE-2013-0169. Errores en en el índice del array en el módulo SSL en PolarSSL anterior a v1.2.5 podría permitir a atacantes remotos provocar una denegación de servicio a través de vectores relacionados con un valor de longitud de "padding" especialmente dise... • http://openwall.com/lists/oss-security/2013/02/05/24 • CWE-20: Improper Input Validation •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-0169 – SSL/TLS: CBC padding timing attack (lucky-13)
https://notcve.org/view.php?id=CVE-2013-0169
08 Feb 2013 — The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue. El protocolo TLS v1.1 y v1.2 y el protocolo DTLS v1.0 y v1.2, tal como se... • http://blog.fuseyism.com/index.php/2013/02/20/security-icedtea-2-1-6-2-2-6-2-3-7-for-openjdk-7-released • CWE-310: Cryptographic Issues •