An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). The calculations performed by mbedtls_mpi_exp_mod are not limited; thus, supplying overly large parameters could lead to denial of service when generating Diffie-Hellman key pairs.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
|
History
No history.
Information
Published : 2021-08-23 02:15
Updated : 2024-11-21 05:29
NVD link : CVE-2020-36475
Mitre link : CVE-2020-36475
CVE.ORG link : CVE-2020-36475
JSON object : View
Products Affected
debian
- debian_linux
siemens
- simatic_rtu3031c_firmware
- simatic_rtu3041c_firmware
- logo\!_cmr2040_firmware
- simatic_rtu3030c
- simatic_rtu3041c
- simatic_rtu3000c
- simatic_rtu3031c
- logo\!_cmr2020
- logo\!_cmr2020_firmware
- simatic_rtu3000c_firmware
- simatic_rtu3030c_firmware
- logo\!_cmr2040
arm
- mbed_tls
CWE
CWE-131
Incorrect Calculation of Buffer Size