{"id":"CVE-2018-0488","details":"ARM mbed TLS before 1.3.22, before 2.1.10, and before 2.7.0, when the truncated HMAC extension and CBC are used, allows remote attackers to execute arbitrary code or cause a denial of service (heap corruption) via a crafted application packet within a TLS or DTLS session.","modified":"2026-03-20T11:23:33.982305Z","published":"2018-02-13T15:29:00.263Z","related":["MGASA-2018-0163","openSUSE-SU-2018:0488-1","openSUSE-SU-2018:0491-1","openSUSE-SU-2024:11043-1"],"references":[{"type":"WEB","url":"https://usn.ubuntu.com/4267-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4138"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4147"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/103057"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201804-19"},{"type":"ADVISORY","url":"https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-01"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/armmbed/mbedtls","events":[{"introduced":"d93d28e370c41b5dc08758776898502f4d38242a"},{"fixed":"40334b814c8736a49530b7065844a7bdca3530bd"},{"introduced":"0a0c22e0efcf2f8f71d7e16712f80b8f77326f72"},{"fixed":"4c53d0dcb295d36202fe9df535aba0dafddbf670"},{"introduced":"8254ed2a9fadede8c6bf414072f78fc78d5af61c"},{"fixed":"32605dc83042d737e715a685e53176388d73540e"}],"database_specific":{"versions":[{"introduced":"1.3.0"},{"fixed":"1.3.22"},{"introduced":"2.1.0"},{"fixed":"2.1.10"},{"introduced":"2.2.0"},{"fixed":"2.7.0"}]}}],"versions":["beta-oob-2","list","mbedos-16.01-release","mbedos-16.03-release","mbedos-2016q1-oob1","mbedos-2016q1-oob2","mbedos-2016q1-oob3","mbedos-release-15-11","mbedos-techcon-oob2","mbedtls-1.3.10","mbedtls-1.3.11","mbedtls-1.3.12","mbedtls-1.3.13","mbedtls-1.3.14","mbedtls-1.3.15","mbedtls-1.3.16","mbedtls-1.3.17","mbedtls-1.3.18","mbedtls-1.3.19","mbedtls-1.3.19-rc1","mbedtls-1.3.20","mbedtls-1.3.21","mbedtls-1.3.21-rc1","mbedtls-1.4-dtls-preview","mbedtls-2.0.0","mbedtls-2.1.0","mbedtls-2.1.1","mbedtls-2.1.2","mbedtls-2.1.3","mbedtls-2.1.4","mbedtls-2.1.5","mbedtls-2.1.6","mbedtls-2.1.7","mbedtls-2.1.7-rc1","mbedtls-2.1.8","mbedtls-2.1.9","mbedtls-2.1.9-rc1","mbedtls-2.2.0","mbedtls-2.2.1","mbedtls-2.3.0","mbedtls-2.4.0","mbedtls-2.5.0","mbedtls-2.5.1","mbedtls-2.6.0","mbedtls-2.6.0-rc1","mbedtls-2.7.0-rc1","polarssl-1.3.0","polarssl-1.3.1","polarssl-1.3.2","polarssl-1.3.3","polarssl-1.3.4","polarssl-1.3.5","polarssl-1.3.6","polarssl-1.3.7","polarssl-1.3.8","polarssl-1.3.9","yotta-2.2.1","yotta-2.2.2","yotta-2.2.3","yotta-2.3.0","yotta-2.3.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-0488.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}