cve/2017/CVE-2017-5872.md

18 lines
890 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2017-5872](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5872)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The TCP/IP networking module in Unisys ClearPath MCP systems with TCP-IP-SW 57.1 before 57.152, 58.1 before 58.142, or 59.1 before 59.172, when running a TLS 1.2 service, allows remote attackers to cause a denial of service (network connectivity disruption) via a client hello with a signature_algorithms extension above those defined in RFC 5246, which triggers a full memory dump.
### POC
#### Reference
- https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=42
#### Github
No PoCs found on GitHub currently.