An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). The calculations performed by mbedtls_mpi_exp_mod are not limited; thus, supplying overly large parameters could lead to denial of service when generating Diffie-Hellman key pairs.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-756638.pdf | Patch Third Party Advisory |
https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.9 | Release Notes Third Party Advisory |
https://github.com/ARMmbed/mbedtls/releases/tag/v2.25.0 | Release Notes Third Party Advisory |
https://github.com/ARMmbed/mbedtls/releases/tag/v2.7.18 | Release Notes Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/11/msg00021.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html | Mailing List Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-08-23T00:00:00
Updated: 2022-12-26T00:00:00
Reserved: 2021-08-23T00:00:00
Link: CVE-2020-36475
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-08-23T02:15:06.930
Modified: 2023-01-11T17:00:44.207
Link: CVE-2020-36475
JSON object: View
Redhat Information
No data.
CWE