Lucene search

K

56 matches found

cve
cve
added 2025/07/20 7:15 p.m.28 views

CVE-2025-47917

Mbed TLS before 3.6.4 allows a use-after-free in certain situations of applications that are developed in accordance with the documentation. The function mbedtls_x509_string_to_names() takes a head argument that is documented as an output argument. The documentation does not suggest that the functi...

9.8CVSS6.8AI score0.00064EPSS
cve
cve
added 2025/07/20 6:15 p.m.24 views

CVE-2025-48965

Mbed TLS before 3.6.4 has a NULL pointer dereference because mbedtls_asn1_store_named_data can trigger conflicting data with val.p of NULL but val.len greater than zero.

7.5CVSS6.6AI score0.00061EPSS
cve
cve
added 2025/07/04 3:15 p.m.23 views

CVE-2025-52497

Mbed TLS before 3.6.4 has a PEM parsing one-byte heap-based buffer underflow, in mbedtls_pem_read_buffer and two mbedtls_pk_parse functions, via untrusted PEM input.

4.8CVSS6.8AI score0.00061EPSS
cve
cve
added 2025/07/04 3:15 p.m.17 views

CVE-2025-49600

In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_verify may accept invalid signatures if hash computation fails and internal errors go unchecked, enabling LMS (Leighton-Micali Signature) forgery in a fault scenario. Specifically, unchecked return values in mbedtls_lms_verify allow an attacker (who can in...

4.9CVSS7AI score0.00009EPSS
cve
cve
added 2025/07/04 3:15 p.m.17 views

CVE-2025-49601

In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not check that the input buffer is at least 4 bytes before reading a 32-bit field, allowing a possible out-of-bounds read on truncated input. Specifically, an out-of-bounds read in mbedtls_lms_import_public_key allows context-depende...

6.5CVSS6.5AI score0.00053EPSS
cve
cve
added 2025/07/20 7:15 p.m.16 views

CVE-2025-49087

In Mbed TLS 3.6.1 through 3.6.3 before 3.6.4, a timing discrepancy in block cipher padding removal allows an attacker to recover the plaintext when PKCS#7 padding mode is used.

4CVSS6.8AI score0.00051EPSS
Total number of security vulnerabilities56