{"id":"CVE-2018-0487","details":"ARM mbed TLS before 1.3.22, before 2.1.10, and before 2.7.0 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via a crafted certificate chain that is mishandled during RSASSA-PSS signature verification within a TLS or DTLS session.","modified":"2026-04-11T12:06:11.983482Z","published":"2018-02-13T15:29:00.217Z","related":["MGASA-2018-0163","openSUSE-SU-2018:0488-1","openSUSE-SU-2018:0491-1","openSUSE-SU-2024:11043-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"8.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"9.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"}]},"references":[{"type":"WEB","url":"https://usn.ubuntu.com/4267-1/"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/103056"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201804-19"},{"type":"ADVISORY","url":"https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-01"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4138"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4147"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/Mbed-TLS/mbedtls","events":[{"introduced":"1910aa78a3677f1bc2a6c6af61d08dc4cccd917a"},{"fixed":"40334b814c8736a49530b7065844a7bdca3530bd"},{"introduced":"0a0c22e0efcf2f8f71d7e16712f80b8f77326f72"},{"fixed":"4c53d0dcb295d36202fe9df535aba0dafddbf670"},{"introduced":"8254ed2a9fadede8c6bf414072f78fc78d5af61c"},{"fixed":"32605dc83042d737e715a685e53176388d73540e"}],"database_specific":{"extracted_events":[{"introduced":"1.3.8"},{"fixed":"1.3.22"},{"introduced":"2.1.0"},{"fixed":"2.1.10"},{"introduced":"2.2.0"},{"fixed":"2.7.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*"}}],"versions":["list","mbedos-release-15-11","mbedtls-1.3.11","mbedtls-1.3.12","mbedtls-1.3.13","mbedtls-1.3.14","mbedtls-1.3.15","mbedtls-1.3.16","mbedtls-1.3.17","mbedtls-1.3.18","mbedtls-1.3.19","mbedtls-1.3.20","mbedtls-1.3.21","mbedtls-1.3.21-rc1","mbedtls-2.1.0","mbedtls-2.1.1","mbedtls-2.1.2","mbedtls-2.1.3","mbedtls-2.1.4","mbedtls-2.1.5","mbedtls-2.1.6","mbedtls-2.1.8","mbedtls-2.1.9","mbedtls-2.1.9-rc1","mbedtls-2.2.0","mbedtls-2.2.1","mbedtls-2.3.0","mbedtls-2.4.0","mbedtls-2.5.0","mbedtls-2.5.1","mbedtls-2.6.0","mbedtls-2.6.0-rc1","mbedtls-2.7.0-rc1","polarssl-1.3.8","polarssl-1.3.9","yotta-2.3.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-0487.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}