CVE-2013-5914

Buffer overflow in the ssl_read_record function in ssl_tls.c in PolarSSL before 1.1.8, when using TLS 1.1, might allow remote attackers to execute arbitrary code via a long packet.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.0:rc0:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.6:*:*:*:*:*:*:*

History

21 Nov 2024, 01:58

Type Values Removed Values Added
References () http://www.debian.org/security/2013/dsa-2782 - () http://www.debian.org/security/2013/dsa-2782 -
References () https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2013-04 - Patch, Vendor Advisory () https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2013-04 - Patch, Vendor Advisory

Information

Published : 2013-10-26 17:55

Updated : 2024-11-21 01:58


NVD link : CVE-2013-5914

Mitre link : CVE-2013-5914

CVE.ORG link : CVE-2013-5914


JSON object : View

Products Affected

polarssl

  • polarssl
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer