{"id":"CVE-2017-18187","details":"In ARM mbed TLS before 2.7.0, there is a bounds-check bypass through an integer overflow in PSK identity parsing in the ssl_parse_client_psk_identity() function in library/ssl_srv.c.","modified":"2026-04-11T04:38:16.280169Z","published":"2018-02-14T17:29:00.237Z","related":["openSUSE-SU-2018:0488-1","openSUSE-SU-2018:0491-1"],"references":[{"type":"WEB","url":"https://usn.ubuntu.com/4267-1/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201804-19"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4138"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4147"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/103055"},{"type":"ADVISORY","url":"https://github.com/ARMmbed/mbedtls/blob/master/ChangeLog"},{"type":"FIX","url":"https://github.com/ARMmbed/mbedtls/commit/83c9f495ffe70c7dd280b41fdfd4881485a3bc28"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/armmbed/mbedtls","events":[{"introduced":"0"},{"fixed":"32605dc83042d737e715a685e53176388d73540e"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.7.0"}]}},{"type":"GIT","repo":"https://github.com/mbed-tls/mbedtls","events":[{"introduced":"0"},{"fixed":"83c9f495ffe70c7dd280b41fdfd4881485a3bc28"}]}],"versions":["beta-oob-2","mbedos-release-15-11","mbedos-techcon-oob2","mbedtls-2.0.0","mbedtls-2.1.0","mbedtls-2.1.1","mbedtls-2.1.2","mbedtls-2.2.0","mbedtls-2.2.1","mbedtls-2.3.0","mbedtls-2.4.0","mbedtls-2.5.0","mbedtls-2.5.1","mbedtls-2.6.0","mbedtls-2.6.0-rc1","mbedtls-2.7.0-rc1","polarssl-1.2.0","polarssl-1.2.1","polarssl-1.2.2","polarssl-1.2.4","polarssl-1.2.5","polarssl-1.2.6","polarssl-1.3.0","polarssl-1.3.0-rc0","polarssl-1.3.1","polarssl-1.3.2","polarssl-1.3.3","polarssl-1.3.4","polarssl-1.3.5","polarssl-1.3.6","polarssl-1.3.7","polarssl-1.3.8","polarssl-1.3.9","yotta-2.3.1"],"database_specific":{"vanir_signatures":[{"deprecated":false,"target":{"file":"library/ssl_srv.c"},"source":"https://github.com/mbed-tls/mbedtls/commit/83c9f495ffe70c7dd280b41fdfd4881485a3bc28","digest":{"threshold":0.9,"line_hashes":["146705795122806448969502256052171142492","250739608582514144555358197331282491043","138311258465109895060410760846872072497","226521422758386904350980188820999931980","166683699188758028603646729933607871728","135889021735654070488482182026670372764","179663835056930844441641430651641120248","26630778509266565837874525009607955193"]},"id":"CVE-2017-18187-2d89a41b","signature_version":"v1","signature_type":"Line"},{"deprecated":false,"target":{"function":"ssl_parse_client_psk_identity","file":"library/ssl_srv.c"},"source":"https://github.com/mbed-tls/mbedtls/commit/83c9f495ffe70c7dd280b41fdfd4881485a3bc28","digest":{"length":1429,"function_hash":"121718152799964170990906735473705715749"},"id":"CVE-2017-18187-601b0b25","signature_version":"v1","signature_type":"Function"}],"vanir_signatures_modified":"2026-04-11T04:38:16Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-18187.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}