SB2017031303 - Improper Certificate Validation in mbedtls (Alpine package)
Published: March 13, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper Certificate Validation (CVE-ID: CVE-2017-2784)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
An exploitable free of a stack pointer vulnerability exists in the x509 certificate parsing code of ARM mbed TLS before 1.3.19, 2.x before 2.1.7, and 2.4.x before 2.4.2. A specially crafted x509 certificate, when parsed by mbed TLS library, can cause an invalid free of a stack pointer leading to a potential remote code execution. In order to exploit this vulnerability, an attacker can act as either a client or a server on a network to deliver malicious x509 certificates to vulnerable applications.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=12f88f964ce5637e0f8cbe1b8eb8119a52d2eac7
- https://git.alpinelinux.org/aports/commit/?id=44a52d56ef47740226463f2fba905f0ccfee8b03
- https://git.alpinelinux.org/aports/commit/?id=358bfd4c6817e4df398ed5f13fb7b17389e085da
- https://git.alpinelinux.org/aports/commit/?id=5844fdc04fa839ce6dca229918343a0ab5b9fa71
- https://git.alpinelinux.org/aports/commit/?id=375f5f18399ef5d24b7853f4f4eb7c90169e5baa
- https://git.alpinelinux.org/aports/commit/?id=487db0f517a612dff85ebf8b4e8df6c0e9a71ba6