CVE-2016-6892

Published on: 01/05/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:11 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Certain versions of Matrixssl from Matrixssl contain the following vulnerability:

The x509FreeExtensions function in MatrixSSL before 3.8.6 allows remote attackers to cause a denial of service (free of unallocated memory) via a crafted X.509 certificate.

  • CVE-2016-6892 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
MatrixSSL VU#396440 Heap Based Buffer Overflow and Multiple Denial of Service Vulnerabilities Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 93498
matrixssl/CHANGES.md at 3-8-6-open · matrixssl/matrixssl · GitHub Patch
Release Notes
Third Party Advisory
github.com
text/html
URL Logo CONFIRM github.com/matrixssl/matrixssl/blob/3-8-6-open/CHANGES.md
Flawed MatrixSSL Code Highlights Need for Better IoT Update Practices Technical Description
Third Party Advisory
www.tripwire.com
text/html
URL Logo MISC www.tripwire.com/state-of-security/security-data-protection/cyber-security/flawed-matrixssl-code-highlights-need-for-better-iot-update-practices/
Vulnerability Note VU#396440 - MatrixSSL contains multiple vulnerabilities Third Party Advisory
US Government Resource
www.kb.cert.org
text/html
URL Logo CERT-VN VU#396440

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationMatrixsslMatrixsslAllAllAllAll
  • cpe:2.3:a:matrixssl:matrixssl:*:*:*:*:*:*:*:*: