ID

VAR-201706-0486


CVE

CVE-2017-2781


TITLE

InsideSecure MatrixSSL Buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-005021

DESCRIPTION

An exploitable heap buffer overflow vulnerability exists in the X509 certificate parsing functionality of InsideSecure MatrixSSL 3.8.7b. A specially crafted x509 certificate can cause a buffer overflow on the heap resulting in remote code execution. To trigger this vulnerability, a specially crafted x509 certificate must be presented to the vulnerable client or server application when initiating secure connection. InsideSecure MatrixSSL Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Inside Secure MatrixSSL is an IoT application toolkit from the French company Inside Secure, which can implement TLS and DTLS in a modular way. MatrixSSL is prone to multiple buffer-overflow vulnerabilities. Failed exploit attempts will result in denial-of-service conditions. MatrixSSL 3.8.7b is vulnerable; other versions may also be affected

Trust: 3.06

sources: NVD: CVE-2017-2781 // JVNDB: JVNDB-2017-005021 // CNVD: CNVD-2017-15853 // CNNVD: CNNVD-201706-980 // BID: 99249 // VULMON: CVE-2017-2781

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-15853

AFFECTED PRODUCTS

vendor:matrixsslmodel:matrixsslscope:eqversion:3.8.7b

Trust: 2.4

vendor:insidemodel:secure matrixssl 3.8.7bscope: - version: -

Trust: 0.6

vendor:matrixsslmodel:3.8.7bscope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2017-15853 // BID: 99249 // JVNDB: JVNDB-2017-005021 // CNNVD: CNNVD-201706-980 // NVD: CVE-2017-2781

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-2781
value: CRITICAL

Trust: 1.0

talos-cna@cisco.com: CVE-2017-2781
value: HIGH

Trust: 1.0

NVD: CVE-2017-2781
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2017-15853
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201706-980
value: CRITICAL

Trust: 0.6

VULMON: CVE-2017-2781
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-2781
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2017-15853
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2017-2781
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

talos-cna@cisco.com: CVE-2017-2781
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.0

Trust: 1.0

NVD: CVE-2017-2781
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2017-15853 // VULMON: CVE-2017-2781 // JVNDB: JVNDB-2017-005021 // CNNVD: CNNVD-201706-980 // NVD: CVE-2017-2781 // NVD: CVE-2017-2781

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:CWE-119

Trust: 0.8

sources: JVNDB: JVNDB-2017-005021 // NVD: CVE-2017-2781

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201706-980

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201706-980

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-005021

PATCH

title:GUARD TLS-TK, a compact TLS/DTLS stack for embedded securityurl:https://www.insidesecure.com/Products/Data-Communication/Secure-Communication-Toolkits/GUARD-TLS-TK

Trust: 0.8

title:Patch for Inside Secure MatrixSSL Buffer Overflow Vulnerability (CNVD-2017-15853)url:https://www.cnvd.org.cn/patchInfo/show/98515

Trust: 0.6

title: - url:https://github.com/Live-Hack-CVE/CVE-2017-2781

Trust: 0.1

sources: CNVD: CNVD-2017-15853 // VULMON: CVE-2017-2781 // JVNDB: JVNDB-2017-005021

EXTERNAL IDS

db:NVDid:CVE-2017-2781

Trust: 3.4

db:TALOSid:TALOS-2017-0277

Trust: 3.4

db:BIDid:99249

Trust: 2.6

db:JVNDBid:JVNDB-2017-005021

Trust: 0.8

db:CNVDid:CNVD-2017-15853

Trust: 0.6

db:CNNVDid:CNNVD-201706-980

Trust: 0.6

db:TALOSid:TALOS-2017-0278

Trust: 0.3

db:TALOSid:TALOS-2017-0276

Trust: 0.3

db:VULMONid:CVE-2017-2781

Trust: 0.1

sources: CNVD: CNVD-2017-15853 // VULMON: CVE-2017-2781 // BID: 99249 // JVNDB: JVNDB-2017-005021 // CNNVD: CNNVD-201706-980 // NVD: CVE-2017-2781

REFERENCES

url:https://talosintelligence.com/vulnerability_reports/talos-2017-0277

Trust: 3.4

url:http://www.securityfocus.com/bid/99249

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2781

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-2781

Trust: 0.8

url:http://www.matrixssl.org/index.html

Trust: 0.3

url:https://talosintelligence.com/vulnerability_reports/talos-2017-0278

Trust: 0.3

url:https://talosintelligence.com/vulnerability_reports/talos-2017-0276

Trust: 0.3

url:http://blog.talosintelligence.com/2017/06/matrixssl-multiple-vulns.html

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2017-2781

Trust: 0.1

url:https://tools.cisco.com/security/center/viewalert.x?alertid=54289

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2017-15853 // VULMON: CVE-2017-2781 // BID: 99249 // JVNDB: JVNDB-2017-005021 // CNNVD: CNNVD-201706-980 // NVD: CVE-2017-2781

CREDITS

Aleksandar Nikolic of Cisco Talos.

Trust: 0.3

sources: BID: 99249

SOURCES

db:CNVDid:CNVD-2017-15853
db:VULMONid:CVE-2017-2781
db:BIDid:99249
db:JVNDBid:JVNDB-2017-005021
db:CNNVDid:CNNVD-201706-980
db:NVDid:CVE-2017-2781

LAST UPDATE DATE

2024-11-23T21:40:58.320000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-15853date:2017-07-21T00:00:00
db:VULMONid:CVE-2017-2781date:2023-01-30T00:00:00
db:BIDid:99249date:2017-06-22T00:00:00
db:JVNDBid:JVNDB-2017-005021date:2017-07-13T00:00:00
db:CNNVDid:CNNVD-201706-980date:2023-02-01T00:00:00
db:NVDid:CVE-2017-2781date:2024-11-21T03:24:08.440

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-15853date:2017-07-21T00:00:00
db:VULMONid:CVE-2017-2781date:2017-06-22T00:00:00
db:BIDid:99249date:2017-06-22T00:00:00
db:JVNDBid:JVNDB-2017-005021date:2017-07-13T00:00:00
db:CNNVDid:CNNVD-201706-980date:2017-06-23T00:00:00
db:NVDid:CVE-2017-2781date:2017-06-22T21:29:00.247