Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-2780

Опубликовано: 22 июн. 2017
Источник: debian
EPSS Низкий

Описание

An exploitable heap buffer overflow vulnerability exists in the X509 certificate parsing functionality of InsideSecure MatrixSSL 3.8.7b. A specially crafted x509 certificate can cause a buffer overflow on the heap resulting in remote code execution. To trigger this vulnerability, a specially crafted x509 certificate must be presented to the vulnerable client or server application when initiating secure connection.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
matrixsslremovedpackage
matrixsslend-of-lifewheezypackage

Примечания

  • https://talosintelligence.com/vulnerability_reports/TALOS-2017-0276

EPSS

Процентиль: 90%
0.05523
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

An exploitable heap buffer overflow vulnerability exists in the X509 certificate parsing functionality of InsideSecure MatrixSSL 3.8.7b. A specially crafted x509 certificate can cause a buffer overflow on the heap resulting in remote code execution. To trigger this vulnerability, a specially crafted x509 certificate must be presented to the vulnerable client or server application when initiating secure connection.

CVSS3: 9.8
nvd
больше 8 лет назад

An exploitable heap buffer overflow vulnerability exists in the X509 certificate parsing functionality of InsideSecure MatrixSSL 3.8.7b. A specially crafted x509 certificate can cause a buffer overflow on the heap resulting in remote code execution. To trigger this vulnerability, a specially crafted x509 certificate must be presented to the vulnerable client or server application when initiating secure connection.

CVSS3: 9.8
github
больше 3 лет назад

An exploitable heap buffer overflow vulnerability exists in the X509 certificate parsing functionality of InsideSecure MatrixSSL 3.8.7b. A specially crafted x509 certificate can cause a buffer overflow on the heap resulting in remote code execution. To trigger this vulnerability, a specially crafted x509 certificate must be presented to the vulnerable client or server application when initiating secure connection.

fstec
около 9 лет назад

Уязвимость процедуры синтаксического анализа сертификатов x509 криптографической библиотеки MatrixSSL, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 90%
0.05523
Низкий