{"id":"CVE-2017-2784","details":"An exploitable free of a stack pointer vulnerability exists in the x509 certificate parsing code of ARM mbed TLS before 1.3.19, 2.x before 2.1.7, and 2.4.x before 2.4.2. A specially crafted x509 certificate, when parsed by mbed TLS library, can cause an invalid free of a stack pointer leading to a potential remote code execution. In order to exploit this vulnerability, an attacker can act as either a client or a server on a network to deliver malicious x509 certificates to vulnerable applications.","modified":"2026-03-14T09:25:33.856808Z","published":"2017-04-20T18:59:01.593Z","related":["MGASA-2017-0094","openSUSE-SU-2017:0790-1","openSUSE-SU-2017:0792-1","openSUSE-SU-2024:11043-1"],"references":[{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201706-18"},{"type":"ADVISORY","url":"https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-01"},{"type":"EVIDENCE","url":"http://www.talosintelligence.com/reports/TALOS-2017-0274/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/armmbed/mbedtls","events":[{"introduced":"0"},{"last_affected":"c1d54bb7b2a80d0f153fd92a13e1b901778f17d3"},{"introduced":"0"},{"last_affected":"4cb87f409df0ddd878ea50cfca7dc8735ee574f2"},{"introduced":"0"},{"last_affected":"0a0c22e0efcf2f8f71d7e16712f80b8f77326f72"},{"introduced":"0"},{"last_affected":"8cea8ad8b825b0bf5884054af7499f1d5c3ebeb4"},{"introduced":"0"},{"last_affected":"c4e7d8a3817bbdee218328efa9e482217038152b"},{"introduced":"0"},{"last_affected":"ef43d41f671805406fd83cdf8ec5f54b1fa12c33"},{"introduced":"0"},{"last_affected":"543e4366bc102d59623717b9053547d10605e725"},{"introduced":"0"},{"last_affected":"b998e27547f986427730f033f4d1bcd028ffd08f"},{"introduced":"0"},{"last_affected":"016a0d3b6f23130a7f26c32afb5df08efcf19967"},{"introduced":"0"},{"last_affected":"1a6a15c795922f05bd2ea17addf27eddcd256a15"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.3.18"},{"introduced":"0"},{"last_affected":"2.0.0"},{"introduced":"0"},{"last_affected":"2.1.0"},{"introduced":"0"},{"last_affected":"2.1.1"},{"introduced":"0"},{"last_affected":"2.1.2"},{"introduced":"0"},{"last_affected":"2.1.3"},{"introduced":"0"},{"last_affected":"2.1.4"},{"introduced":"0"},{"last_affected":"2.1.5"},{"introduced":"0"},{"last_affected":"2.1.6"},{"introduced":"0"},{"last_affected":"2.4.0"}]}}],"versions":["list","mbedtls-1.3.10","mbedtls-1.3.11","mbedtls-1.3.12","mbedtls-1.3.13","mbedtls-1.3.14","mbedtls-1.3.15","mbedtls-1.3.16","mbedtls-1.3.17","mbedtls-1.3.18","mbedtls-1.4-dtls-preview","mbedtls-2.0.0","polarssl-1.2.0","polarssl-1.2.1","polarssl-1.2.2","polarssl-1.2.3","polarssl-1.2.4","polarssl-1.2.5","polarssl-1.2.6","polarssl-1.3.0","polarssl-1.3.0-rc0","polarssl-1.3.1","polarssl-1.3.2","polarssl-1.3.3","polarssl-1.3.4","polarssl-1.3.5","polarssl-1.3.6","polarssl-1.3.7","polarssl-1.3.8","polarssl-1.3.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-2784.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}