Bug 1216078 (CVE-2023-45199) - VUL-0: CVE-2023-45199: mbedtls: buffer overflow in TLS handshake parsing with ECDH
Summary: VUL-0: CVE-2023-45199: mbedtls: buffer overflow in TLS handshake parsing with...
Status: NEW
Alias: CVE-2023-45199
Product: openSUSE Distribution
Classification: openSUSE
Component: Security (show other bugs)
Version: Leap 15.6
Hardware: Other Other
: P3 - Medium : Normal (vote)
Target Milestone: ---
Assignee: Martin Pluskal
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/381070/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-10-10 06:49 UTC by SMASH SMASH
Modified: 2023-10-11 12:35 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2023-10-10 06:49:49 UTC
Title: Buffer overflow in TLS handshake parsing with ECDH
CVE: CVE-2023-45199
Date: 05 October 2023
Affects: Mbed TLS 3.2.0 and above
Impact: A remote attacker may cause arbitrary code execution.
Severity: HIGH
Credit: OSS-Fuzz


Vulnerability:
A TLS 1.3 client or server configured with support for signature-based authentication (i.e. any non-PSK key exchange) is vulnerable to a heap buffer overflow. The server copies up to 65535 bytes in a buffer that is shorter. An unauthenticated malicious peer can overflow the TLS handshake structure by sending an overly long ECDH or FFDH public key.

A TLS 1.2 server configured with MBEDTLS_USE_PSA_CRYPTO and with support for a cipher suite using ECDH and a signature is vulnerable to a heap buffer overflow. An unauthenticated malicious peer can overflow the TLS handshake structure by sending an overly long ECDH public key. The server copies up to 255 bytes into a heap buffer that is sized for a valid public key, and thus shorter unless RSA or FFDH is enabled in addition to ECDH. TLS 1.2 clients, and builds without MBEDTLS_USE_PSA_CRYPTO are not affected.


References:
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2023-10-2/
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45199
Comment 2 OBSbugzilla Bot 2023-10-11 12:35:07 UTC
This is an autogenerated message for OBS integration:
This bug (1216078) was mentioned in
https://build.opensuse.org/request/show/1116911 Factory / mbedtls