In Mbed TLS 3.3.0 through 3.5.2 before 3.6.0, a malicious client can cause information disclosure or a denial of service because of a stack buffer over-read (of less than 256 bytes) in a TLS 1.3 server via a TLS 3.1 ClientHello.
References
| Link | Resource |
|---|---|
| https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.0 | Release Notes |
| https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/ | Vendor Advisory |
| https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.0 | Release Notes |
| https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/ | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2024-04-03 03:15
Updated : 2025-06-27 17:46
NVD link : CVE-2024-30166
Mitre link : CVE-2024-30166
CVE.ORG link : CVE-2024-30166
JSON object : View
Products Affected
arm
- mbed_tls
CWE
CWE-121
Stack-based Buffer Overflow
