CVE-2017-2784
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An exploitable free of a stack pointer vulnerability exists in the x509 certificate parsing code of ARM mbed TLS before 1.3.19, 2.x before 2.1.7, and 2.4.x before 2.4.2. A specially crafted x509 certificate, when parsed by mbed TLS library, can cause an invalid free of a stack pointer leading to a potential remote code execution. In order to exploit this vulnerability, an attacker can act as either a client or a server on a network to deliver malicious x509 certificates to vulnerable applications.
Existe una vulnerabilidad explotable libre de un apuntador de pila en el código de análisis de certificado x509 de ARM mbed TLS en versiones anteriores a 1.3.19, 2.x en versiones anteriores a 2.1.7 y 2.4.x en versiones anteriores a 2.4.2. Un certificado x509 especialmente manipulado, cuando se analiza por la biblioteca TLS mbed, puede provocar un inválido libre de un puntero de pila que conduce a una posible ejecución de código remoto. Para aprovechar esta vulnerabilidad, un atacante puede actuar como un cliente o un servidor en una red para entregar certificados maliciosos x509 a aplicaciones vulnerables.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-12-01 CVE Reserved
- 2017-04-20 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2024-09-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-295: Improper Certificate Validation
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
http://www.talosintelligence.com/reports/TALOS-2017-0274 | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/201706-18 | 2022-04-19 | |
https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-01 | 2022-04-19 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Arm Search vendor "Arm" | Mbed Tls Search vendor "Arm" for product "Mbed Tls" | <= 1.3.18 Search vendor "Arm" for product "Mbed Tls" and version " <= 1.3.18" | - |
Affected
| ||||||
Arm Search vendor "Arm" | Mbed Tls Search vendor "Arm" for product "Mbed Tls" | 2.0.0 Search vendor "Arm" for product "Mbed Tls" and version "2.0.0" | - |
Affected
| ||||||
Arm Search vendor "Arm" | Mbed Tls Search vendor "Arm" for product "Mbed Tls" | 2.1.0 Search vendor "Arm" for product "Mbed Tls" and version "2.1.0" | - |
Affected
| ||||||
Arm Search vendor "Arm" | Mbed Tls Search vendor "Arm" for product "Mbed Tls" | 2.1.1 Search vendor "Arm" for product "Mbed Tls" and version "2.1.1" | - |
Affected
| ||||||
Arm Search vendor "Arm" | Mbed Tls Search vendor "Arm" for product "Mbed Tls" | 2.1.2 Search vendor "Arm" for product "Mbed Tls" and version "2.1.2" | - |
Affected
| ||||||
Arm Search vendor "Arm" | Mbed Tls Search vendor "Arm" for product "Mbed Tls" | 2.1.3 Search vendor "Arm" for product "Mbed Tls" and version "2.1.3" | - |
Affected
| ||||||
Arm Search vendor "Arm" | Mbed Tls Search vendor "Arm" for product "Mbed Tls" | 2.1.4 Search vendor "Arm" for product "Mbed Tls" and version "2.1.4" | - |
Affected
| ||||||
Arm Search vendor "Arm" | Mbed Tls Search vendor "Arm" for product "Mbed Tls" | 2.1.5 Search vendor "Arm" for product "Mbed Tls" and version "2.1.5" | - |
Affected
| ||||||
Arm Search vendor "Arm" | Mbed Tls Search vendor "Arm" for product "Mbed Tls" | 2.1.6 Search vendor "Arm" for product "Mbed Tls" and version "2.1.6" | - |
Affected
| ||||||
Arm Search vendor "Arm" | Mbed Tls Search vendor "Arm" for product "Mbed Tls" | 2.4.0 Search vendor "Arm" for product "Mbed Tls" and version "2.4.0" | - |
Affected
|