CVE-2017-5872
Summary
| CVE | CVE-2017-5872 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-03-10 02:59:00 UTC |
| Updated | 2017-03-16 15:20:00 UTC |
| Description | The TCP/IP networking module in Unisys ClearPath MCP systems with TCP-IP-SW 57.1 before 57.152, 58.1 before 58.142, or 59.1 before 59.172, when running a TLS 1.2 service, allows remote attackers to cause a denial of service (network connectivity disruption) via a client hello with a signature_algorithms extension above those defined in RFC 5246, which triggers a full memory dump. |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Unisys | Clearpath Mcp | 57.1 | All | All | All |
| Application | Unisys | Clearpath Mcp | 58.1 | All | All | All |
| Application | Unisys | Clearpath Mcp | 59.1 | All | All | All |
| Application | Unisys | Clearpath Mcp | 57.1 | All | All | All |
| Application | Unisys | Clearpath Mcp | 58.1 | All | All | All |
| Application | Unisys | Clearpath Mcp | 59.1 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Vulnerability Report - ClearPath MCP TCP/IP Networking dumps when parsing TLS v1.2 client hello with newer signature algorithms | CONFIRM | public.support.unisys.com | Vendor Advisory |
| Unisys ClearPath MCP CVE-2017-5872 Denial of Service Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.