Lucene search

K
debianDebianDEBIAN:DLA-331-1:D38DB
HistoryOct 22, 2015 - 6:09 p.m.

[SECURITY] [DLA 331-1] polarssl security update

2015-10-2218:09:19
lists.debian.org
14

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.3 High

AI Score

Confidence

High

0.013 Low

EPSS

Percentile

86.2%

Package : polarssl
Version : 1.2.9-1~deb6u5
CVE ID : CVE-2015-5291

A flaw was found in PolarSSl and mbed TLS:

When the client creates its ClientHello message, due to insufficient
bounds checking it can overflow the heap-based buffer containing the
message while writing some extensions. Two extensions in particular could
be used by a remote attacker to trigger the overflow: the session ticket
extension and the server name indication (SNI) extension.

Although most of the vulnerable code is not present in the Squeeze
version, this upload contains at least a length check for incoming data.

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.3 High

AI Score

Confidence

High

0.013 Low

EPSS

Percentile

86.2%