PT-2023-5756 · Mbed Tls +1 · Mbed Tls +1
Published
2023-10-06
·
Updated
2024-11-14
·
CVE-2023-45199
10
Critical
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions:
Mbed TLS versions 3.2.x through 3.4.x
Description:
The issue is related to a buffer overflow in Mbed TLS, which can lead to remote code execution. This occurs due to a heap-based buffer overflow vulnerability in the implementation of TLS and SSL protocols. An attacker can exploit this by sending specially crafted open ECDH or FFDH keys, allowing them to execute arbitrary code remotely.
Recommendations:
For Mbed TLS versions 3.2.x through 3.4.x, update to version 3.5 or later to resolve the issue.
As a temporary workaround, consider restricting the use of ECDH and FFDH keys in the affected Mbed TLS versions until a patch is available.
Fix
RCE
Buffer Overflow
Related Identifiers
Affected Products
References · 30
- https://bdu.fstec.ru/vul/2024-07428 · Security Note
- https://bdu.fstec.ru/vul/2024-01341 · Security Note
- https://bdu.fstec.ru/vul/2023-06575 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45157 · Security Note
- https://cve.org/CVERecord?id=CVE-2023-45199 · Security Note
- https://osv.dev/vulnerability/CVE-2023-45199 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23170 · Security Note
- https://ubuntu.com/security/CVE-2023-45199 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45199 · Security Note
- https://bdu.fstec.ru/vul/2024-01340 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43615 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23744 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23775 · Security Note
- https://bdu.fstec.ru/vul/2023-06434 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45159 · Security Note