Multiple vulnerabilities in InsideSecure MatrixSSL



Published: 2017-06-23 | Updated: 2017-06-26
Risk High
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2017-2780
CVE-2017-2782
CVE-2017-2781
CWE-ID CWE-122
CWE-190
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
MatrixSSL
Server applications / Server solutions for antivurus protection

Vendor InsideSecure

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Heap-based buffer overflow

EUVDB-ID: #VU7187

Risk: High

CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-2780

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists in the X509 certificate parsing functionality of InsideSecure MatrixSSL due to heap-based buffer overflow. A remote attacker can supply a specially crafted x509 certificate when initiating secure connection, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to version 3.9.3.

Vulnerable software versions

MatrixSSL: 3.8.7 b

External links

http://talosintelligence.com/vulnerability_reports/TALOS-2017-0276


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Information disclosure

EUVDB-ID: #VU7198

Risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-2782

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists in the X509 certificate parsing functionality of InsideSecure MatrixSSL due to length counter overflow. A remote attacker can supply a specially crafted x509 certificate when initiating secure connection, perform out of bounds copy operation, trigger memory leak and read arbitrary files.

Successful exploitation of the vulnerability results in information disclosure.

Mitigation

Update to version 3.9.3.

Vulnerable software versions

MatrixSSL: 3.8.7 b

External links

http://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0278


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Heap-based buffer overflow

EUVDB-ID: #VU7197

Risk: High

CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-2781

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists in the 'parsePolicyMappings' function in MatrixSSL due to heap-based buffer overflow when parsing the IssuerPolicy PolicyMappings extension. A remote attacker can supply a specially crafted x509 certificates in DER format containing OID value, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to version 3.9.3.

Vulnerable software versions

MatrixSSL: 3.8.7 b

External links

http://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0277


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###