![](/assets/img/cve_300x82_sin_bg.png)
CVE-2011-4574
https://notcve.org/view.php?id=CVE-2011-4574
27 Oct 2021 — PolarSSL versions prior to v1.1 use the HAVEGE random number generation algorithm. At its heart, this uses timing information based on the processor's high resolution timer (the RDTSC instruction). This instruction can be virtualized, and some virtual machine hosts have chosen to disable this instruction, returning 0s or predictable results. PolarSSL versiones anteriores a v1.1, usan el algoritmo de generación de números aleatorios HAVEGE. En su esencia, éste usa información de tiempo basada en el temporiza... • https://tls.mbed.org/tech-updates/security-advisories/polarssl-security-advisory-2011-02 • CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2015-5291 – Gentoo Linux Security Advisory 201706-18
https://notcve.org/view.php?id=CVE-2015-5291
02 Nov 2015 — Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long hostname to the server name indication (SNI) extension, which is not properly handled when creating a ClientHello message. NOTE: this identifier has been SPLIT per ADT3 due to different affected version ranges. See CVE-2015-8036 for the session ticket issue th... • http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170317.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2015-8036 – Debian Security Advisory 3468-1
https://notcve.org/view.php?id=CVE-2015-8036
02 Nov 2015 — Heap-based buffer overflow in ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long session ticket name to the session ticket extension, which is not properly handled when creating a ClientHello message to resume a session. NOTE: this identifier was SPLIT from CVE-2015-5291 per ADT3 due to different affected version ranges. Vulnerabilidad de desbordamiento de buffer basado... • http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169625.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2014-9744
https://notcve.org/view.php?id=CVE-2014-9744
24 Aug 2015 — Memory leak in PolarSSL before 1.3.9 allows remote attackers to cause a denial of service (memory consumption) via a large number of ClientHello messages. NOTE: this identifier was SPLIT from CVE-2014-8628 per ADT3 due to different affected versions. Vulnerabilidad de fuga de memoria en PolarSSL en versiones anteriores a 1.3.9, permite a atacantes remotos causar una denegación de servicio (consumo de memoria) a través de una gran cantidad de mensajes CLientHello. NOTA: este identificador ha sido SEPARADO de... • http://lists.opensuse.org/opensuse-updates/2014-11/msg00079.html • CWE-399: Resource Management Errors •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2015-1182 – Gentoo Linux Security Advisory 201801-15
https://notcve.org/view.php?id=CVE-2015-1182
27 Jan 2015 — The asn1_get_sequence_of function in library/asn1parse.c in PolarSSL 1.0 through 1.2.12 and 1.3.x through 1.3.9 does not properly initialize a pointer in the asn1_sequence linked list, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ASN.1 sequence in a certificate. La función asn1_get_sequence_of en library/asn1parse.c en PolarSSL 1.0 hasta 1.2.12 y 1.3.x hasta 1.3.9 no inicializa correctamente un puntero en la lista vinculada asn1_sequence... • http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148829.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2014-8628 – Debian Security Advisory 3116-1
https://notcve.org/view.php?id=CVE-2014-8628
31 Dec 2014 — Memory leak in PolarSSL before 1.2.12 and 1.3.x before 1.3.9 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted X.509 certificates. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2014-9744 for the ClientHello message issue. Vulnerabilidad de fuga de memoria en PolarSSL en versiones anteriores a 1.2.12 y 1.3.x en versiones anteriores a 1.3.9, permite a atacantes remotos causar una denegación de servicio (consumo d... • http://lists.opensuse.org/opensuse-updates/2014-11/msg00079.html • CWE-399: Resource Management Errors •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2014-4911 – Debian Security Advisory 2981-1
https://notcve.org/view.php?id=CVE-2014-4911
20 Jul 2014 — The ssl_decrypt_buf function in library/ssl_tls.c in PolarSSL before 1.2.11 and 1.3.x before 1.3.8 allows remote attackers to cause a denial of service (crash) via vectors related to the GCM ciphersuites, as demonstrated using the Codenomicon Defensics toolkit. La función ssl_decrypt_buf en library/ssl_tls.c en PolarSSL anterior a 1.2.11 y 1.3.x anterior a 1.3.8 permite a atacantes remotos causar una denegación de servicio (caída) a través de vectores relacionados con los suites de cifrado GCM, tal y como f... • http://secunia.com/advisories/60215 • CWE-310: Cryptographic Issues •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-5914 – Debian Security Advisory 2782-1
https://notcve.org/view.php?id=CVE-2013-5914
21 Oct 2013 — Buffer overflow in the ssl_read_record function in ssl_tls.c in PolarSSL before 1.1.8, when using TLS 1.1, might allow remote attackers to execute arbitrary code via a long packet. Buffer overflow en la funcón ssl_read_record en ssl_tls.c de PolarSSL anterior a la versión 1.1.8, cuando se utiliza TLS 1.1, podría permitir a atacantes remotos ejecutar código arbitrario a través de un paquete largo. Multiple security issues have been discovered in PolarSSL, a lightweight crypto and SSL/TLS library. • http://www.debian.org/security/2013/dsa-2782 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2012-2130 – Gentoo Linux Security Advisory 201310-10
https://notcve.org/view.php?id=CVE-2012-2130
17 Oct 2013 — A Security Bypass vulnerability exists in PolarSSL 0.99pre4 through 1.1.1 due to a weak encryption error when generating Diffie-Hellman values and RSA keys. Se presenta una vulnerabilidad de Omisión de Seguridad en PolarSSL versiones 0.99pre4 hasta 1.1.1, debido a un error de cifrado débil cuando se generan valores Diffie-Hellman y claves RSA. Multiple vulnerabilities have been found in PolarSSL, the worst of which might allow a remote attacker to cause a Denial of Service condition. Versions less than 1.3.... • http://security.gentoo.org/glsa/glsa-201310-10.xml • CWE-326: Inadequate Encryption Strength •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-5915 – Gentoo Linux Security Advisory 201310-10
https://notcve.org/view.php?id=CVE-2013-5915
04 Oct 2013 — The RSA-CRT implementation in PolarSSL before 1.2.9 does not properly perform Montgomery multiplication, which might allow remote attackers to conduct a timing side-channel attack and retrieve RSA private keys. La implementación RSA-CRT- en PolarSSL anterior a la versión 1.2.9 no realiza adecuadamente la multiplicación Montgomery, lo que podría permitir a atacantes llevar a cabo un ataque timing side-channel y conseguir las llaves privadas RSA. Multiple vulnerabilities have been found in PolarSSL, the worst... • http://lists.fedoraproject.org/pipermail/package-announce/2013-October/118758.html • CWE-310: Cryptographic Issues •