Buffer Overflow Affecting armmbed/mbedtls package, versions [3.2.0,3.5.0)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.53% (78th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ARMMBEDMBEDTLS-6244780
  • published13 Feb 2024
  • disclosed7 Oct 2023
  • creditUnknown

Introduced: 7 Oct 2023

CVE-2023-45199  (opens in a new tab)
CWE-120  (opens in a new tab)

How to fix?

Upgrade armmbed/mbedtls to version 3.5.0 or higher.

Overview

Affected versions of this package are vulnerable to Buffer Overflow. A TLS 1.3 client or server configured with support for signature-based authentication (i.e. any non-PSK key exchange) is vulnerable. The server copies up to 65535 bytes in a buffer that is shorter. An unauthenticated malicious peer can overflow the TLS handshake structure by sending an overly long ECDH or FFDH public key.

A TLS 1.2 server configured with MBEDTLS_USE_PSA_CRYPTO and with support for a cipher suite using ECDH and a signature is vulnerable to a heap buffer overflow. An unauthenticated malicious peer can overflow the TLS handshake structure by sending an overly long ECDH public key. The server copies up to 255 bytes into a heap buffer that is sized for a valid public key, and thus shorter unless RSA or FFDH is enabled in addition to ECDH. TLS 1.2 clients and builds without MBEDTLS_USE_PSA_CRYPTO are not affected.

References

CVSS Scores

version 3.1