
CVE-2018-0487 – Ubuntu Security Notice USN-4267-1
https://notcve.org/view.php?id=CVE-2018-0487
13 Feb 2018 — ARM mbed TLS before 1.3.22, before 2.1.10, and before 2.7.0 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via a crafted certificate chain that is mishandled during RSASSA-PSS signature verification within a TLS or DTLS session. ARM mbed TLS, en versiones anteriores a la 1.3.22, a la 2.1.10 y a la 2.7.0, permite que atacantes remotos ejecuten código arbitrario o provoquen una denegación de servicio (desbordamiento de búfer) mediante una cadena de certificado... • http://www.securityfocus.com/bid/103056 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2018-0488 – Ubuntu Security Notice USN-4267-1
https://notcve.org/view.php?id=CVE-2018-0488
13 Feb 2018 — ARM mbed TLS before 1.3.22, before 2.1.10, and before 2.7.0, when the truncated HMAC extension and CBC are used, allows remote attackers to execute arbitrary code or cause a denial of service (heap corruption) via a crafted application packet within a TLS or DTLS session. ARM mbed TLS, en versiones anteriores a la 1.3.22, a la 2.1.10 y a la 2.7.0, cuando se usan las extensiones truncadas HMAC y CBC, permite que atacantes remotos ejecuten código arbitrario o provoquen una denegación de servicio (corrupción d... • http://www.securityfocus.com/bid/103057 • CWE-787: Out-of-bounds Write •

CVE-2017-14032 – Debian Security Advisory 3967-1
https://notcve.org/view.php?id=CVE-2017-14032
30 Aug 2017 — ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected. ARM mbed TLS en versiones anteriores a la 1.3.21 y en versiones 2.x anteriores a la 2.1.9, si se configura la autenticación opcional, permite a los atacantes omitir la autenticación Peer median... • http://www.debian.org/security/2017/dsa-3967 • CWE-287: Improper Authentication •

CVE-2017-2784 – Gentoo Linux Security Advisory 201706-18
https://notcve.org/view.php?id=CVE-2017-2784
20 Apr 2017 — An exploitable free of a stack pointer vulnerability exists in the x509 certificate parsing code of ARM mbed TLS before 1.3.19, 2.x before 2.1.7, and 2.4.x before 2.4.2. A specially crafted x509 certificate, when parsed by mbed TLS library, can cause an invalid free of a stack pointer leading to a potential remote code execution. In order to exploit this vulnerability, an attacker can act as either a client or a server on a network to deliver malicious x509 certificates to vulnerable applications. Existe un... • http://www.talosintelligence.com/reports/TALOS-2017-0274 • CWE-295: Improper Certificate Validation •

CVE-2015-8036 – Debian Security Advisory 3468-1
https://notcve.org/view.php?id=CVE-2015-8036
02 Nov 2015 — Heap-based buffer overflow in ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long session ticket name to the session ticket extension, which is not properly handled when creating a ClientHello message to resume a session. NOTE: this identifier was SPLIT from CVE-2015-5291 per ADT3 due to different affected version ranges. Vulnerabilidad de desbordamiento de buffer basado... • http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169625.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2015-5291 – Gentoo Linux Security Advisory 201706-18
https://notcve.org/view.php?id=CVE-2015-5291
02 Nov 2015 — Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long hostname to the server name indication (SNI) extension, which is not properly handled when creating a ClientHello message. NOTE: this identifier has been SPLIT per ADT3 due to different affected version ranges. See CVE-2015-8036 for the session ticket issue th... • http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170317.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •