Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-27810

Опубликовано: 25 мар. 2025
Источник: debian
EPSS Низкий

Описание

Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mbedtlsfixed3.6.3-1package
mbedtlsno-dsabookwormpackage
mbedtlsignoredbullseyepackage

Примечания

  • https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-2/

  • https://github.com/Mbed-TLS/mbedtls/commit/26f0044ad020dc3c8db1b4001464acaef7dfbd52 (mbedtls-3.6.3)

  • https://github.com/Mbed-TLS/mbedtls/commit/6070470dfd5c680a59a55bc55299e1a65a6c7049 (mbedtls-2.28.10)

EPSS

Процентиль: 10%
0.00038
Низкий

Связанные уязвимости

CVSS3: 5.4
ubuntu
6 месяцев назад

Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays.

CVSS3: 5.4
nvd
6 месяцев назад

Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays.

CVSS3: 5.4
github
6 месяцев назад

Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays.

CVSS3: 5.4
fstec
6 месяцев назад

Уязвимость реализации протокола TLS программного обеспечения Mbed TLS, позволяющая нарушителю проводить атаки типа "человек по середине"

CVSS3: 5.4
redos
3 месяца назад

Множественные уязвимости mbedtls

EPSS

Процентиль: 10%
0.00038
Низкий