CVE-2020-36477

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-36477
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-36477.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-36477
Related
Published
2021-08-23T02:15:07Z
Modified
2024-10-12T06:36:26.461808Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

An issue was discovered in Mbed TLS before 2.24.0. The verification of X.509 certificates when matching the expected common name (the cn argument of mbedtlsx509crt_verify) with the actual certificate name is mishandled: when the subjecAltName extension is present, the expected name is compared to any name in that extension regardless of its type. This means that an attacker could impersonate a 4-byte or 16-byte domain by getting a certificate for the corresponding IPv4 or IPv6 address (this would require the attacker to control that IP address, though).

References

Affected packages

Debian:12 / mbedtls

Package

Name
mbedtls
Purl
pkg:deb/debian/mbedtls?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.28.0-0.3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / mbedtls

Package

Name
mbedtls
Purl
pkg:deb/debian/mbedtls?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.28.0-0.3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/mbed-tls/mbedtls

Affected ranges

Type
GIT
Repo
https://github.com/mbed-tls/mbedtls
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

beta-oob-2
list
mbedos-2016q1-oob1
mbedos-2016q1-oob2
mbedos-2016q1-oob3
mbedos-release-15-11
mbedos-techcon-oob2

mbedos-16.*

mbedos-16.01-release
mbedos-16.03-release

mbedtls-1.*

mbedtls-1.3.10
mbedtls-1.4-dtls-preview

mbedtls-2.*

mbedtls-2.0.0
mbedtls-2.1.0
mbedtls-2.1.1
mbedtls-2.1.2
mbedtls-2.10.0
mbedtls-2.11.0
mbedtls-2.12.0
mbedtls-2.13.0
mbedtls-2.13.1
mbedtls-2.14.0
mbedtls-2.15.0
mbedtls-2.15.1
mbedtls-2.16.0
mbedtls-2.17.0
mbedtls-2.18.0
mbedtls-2.19.0
mbedtls-2.19.0d1
mbedtls-2.19.0d2
mbedtls-2.19.1
mbedtls-2.2.0
mbedtls-2.2.1
mbedtls-2.20.0
mbedtls-2.20.0d0
mbedtls-2.20.0d1
mbedtls-2.21.0
mbedtls-2.22.0
mbedtls-2.22.0d0
mbedtls-2.23.0
mbedtls-2.3.0
mbedtls-2.4.0
mbedtls-2.5.0
mbedtls-2.5.1
mbedtls-2.6.0
mbedtls-2.6.0-rc1
mbedtls-2.7.0
mbedtls-2.7.0-rc1
mbedtls-2.8.0
mbedtls-2.8.0-rc1
mbedtls-2.9.0

polarssl-1.*

polarssl-1.2.0
polarssl-1.2.1
polarssl-1.2.2
polarssl-1.2.3
polarssl-1.2.4
polarssl-1.2.5
polarssl-1.2.6
polarssl-1.3.0
polarssl-1.3.0-rc0
polarssl-1.3.1
polarssl-1.3.2
polarssl-1.3.3
polarssl-1.3.4
polarssl-1.3.5
polarssl-1.3.6
polarssl-1.3.7
polarssl-1.3.8
polarssl-1.3.9

v2.*

v2.23.0

yotta-2.*

yotta-2.2.1
yotta-2.2.2
yotta-2.2.3
yotta-2.3.0
yotta-2.3.1