Bug 1216076 (CVE-2023-43615) - VUL-0: CVE-2023-43615: mbedtls: buffer overread in TLS stream cipher suites
Summary: VUL-0: CVE-2023-43615: mbedtls: buffer overread in TLS stream cipher suites
Status: NEW
Alias: CVE-2023-43615
Product: openSUSE Distribution
Classification: openSUSE
Component: Security (show other bugs)
Version: Leap 15.6
Hardware: Other Other
: P3 - Medium : Normal (vote)
Target Milestone: ---
Assignee: Martin Pluskal
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/381069/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-10-10 06:30 UTC by SMASH SMASH
Modified: 2023-10-11 12:35 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2023-10-10 06:30:23 UTC
Title: Buffer overread in TLS stream cipher suites
CVE: CVE-2023-43615
Date: 05 October 2023
Affects: All versions of Mbed TLS
Impact: A remote attacker may cause a crash or information disclosure.
Severity: Medium
Credit: OSS-Fuzz

Vulnerability:
A peer in a (D)TLS connection using a null-cipher or RC4 cipher suite can send a malformed encrypted (or null-encrypted) record that causes a buffer overread of the vulnerable application. When the TLS parsing code calculates the MAC of the record, it subtracts the MAC length from the record length without checking if the record is large enough. As a consequence, if the payload of the record is shorter than the MAC, the code attempts to read slightly less than SIZE_MAX bytes to calculate the MAC of the received record.

Note that only weak cipher suites are affected: cipher suites using the null cipher (TLS_xxx_WITH_NULL_hhh, with authentication but not encryption) or RC4 (TLS_xxx_WITH_RC4_128_hhh, a weak and deprecated cipher, no longer supported after Mbed TLS 3.0). Those cipher suites are disabled in the default build-time configuration.

All protocol versions up to 1.2 are affected, including DTLS. TLS 1.3 is not affected. CBC and AEAD cipher suites are not affected.


References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43615
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2023-10-1/
Comment 2 OBSbugzilla Bot 2023-10-11 12:35:03 UTC
This is an autogenerated message for OBS integration:
This bug (1216076) was mentioned in
https://build.opensuse.org/request/show/1116911 Factory / mbedtls