Vulnerability Description
process_certificate in tls1.c in Cameron Hamilton-Rich axTLS through 2.1.5 has a Buffer Overflow via a crafted TLS certificate handshake message with zero certificates.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Axtls Project | Axtls | <= 2.1.5 |
Related Weaknesses (CWE)
References
- http://axtls.sourceforge.netProduct
- http://packetstormsecurity.com/files/155500/axTLS-2.1.5-Denial-Of-Service.htmlThird Party AdvisoryVDB Entry
- https://seclists.org/bugtraq/2019/Nov/44
- https://www.telekom.com/en/corporate-responsibility/data-protection-data-securit
- https://www.telekom.com/resource/blob/586428/51ae062269fbcb068bd20379f87f1398/dl
- http://axtls.sourceforge.netProduct
- http://packetstormsecurity.com/files/155500/axTLS-2.1.5-Denial-Of-Service.htmlThird Party AdvisoryVDB Entry
- https://seclists.org/bugtraq/2019/Nov/44
- https://www.telekom.com/en/corporate-responsibility/data-protection-data-securit
- https://www.telekom.com/resource/blob/586428/51ae062269fbcb068bd20379f87f1398/dl
FAQ
What is CVE-2019-9689?
CVE-2019-9689 is a vulnerability with a CVSS score of 7.5 (HIGH). process_certificate in tls1.c in Cameron Hamilton-Rich axTLS through 2.1.5 has a Buffer Overflow via a crafted TLS certificate handshake message with zero certificates.
How severe is CVE-2019-9689?
CVE-2019-9689 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-9689?
Check the references section above for vendor advisories and patch information. Affected products include: Axtls Project Axtls.