Vulnerability Description
The TCP/IP networking module in Unisys ClearPath MCP systems with TCP-IP-SW 57.1 before 57.152, 58.1 before 58.142, or 59.1 before 59.172, when running a TLS 1.2 service, allows remote attackers to cause a denial of service (network connectivity disruption) via a client hello with a signature_algorithms extension above those defined in RFC 5246, which triggers a full memory dump.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Unisys | Clearpath Mcp | 57.1 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/96782Third Party AdvisoryVDB Entry
- https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspVendor Advisory
- http://www.securityfocus.com/bid/96782Third Party AdvisoryVDB Entry
- https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspVendor Advisory
FAQ
What is CVE-2017-5872?
CVE-2017-5872 is a vulnerability with a CVSS score of 7.5 (HIGH). The TCP/IP networking module in Unisys ClearPath MCP systems with TCP-IP-SW 57.1 before 57.152, 58.1 before 58.142, or 59.1 before 59.172, when running a TLS 1.2 service, allows remote attackers to ca...
How severe is CVE-2017-5872?
CVE-2017-5872 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-5872?
Check the references section above for vendor advisories and patch information. Affected products include: Unisys Clearpath Mcp.