diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 79b9b98cd59f..1b8a723ae026 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -57,6 +57,42 @@ Notes: --> + + polarssl -- Remote attack using crafted certificates + + + polarssl + 1.2.01.2.12_1 + + + polarssl13 + 1.3.01.3.9_1 + + + + +

PolarSSL team reports:

+
+

During the parsing of a ASN.1 sequence, a pointer in the linked list of asn1_sequence is not + initialized by asn1_get_sequence_of(). In case an error occurs during parsing of the list, a + situation is created where the uninitialized pointer is passed to polarssl_free().

+

This sequence can be triggered when a PolarSSL entity is parsing a certificate. So practically this + means clients when receiving a certificate from the server or servers in case they are actively + asking for a client certificate.

+
+ +
+ + CVE-2015-1182 + https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2014-04 + https://www.certifiedsecure.com/polarssl-advisory/ + + + 2015-01-14 + 2015-01-19 + +
+ unzip -- input sanitization errors