Home

Description

In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not check that the input buffer is at least 4 bytes before reading a 32-bit field, allowing a possible out-of-bounds read on truncated input. Specifically, an out-of-bounds read in mbedtls_lms_import_public_key allows context-dependent attackers to trigger a crash or limited adjacent-memory disclosure by supplying a truncated LMS (Leighton-Micali Signature) public-key buffer under four bytes. An LMS public key starts with a 4-byte type indicator. The function mbedtls_lms_import_public_key reads this type indicator before validating the size of its input.

PUBLISHED Reserved 2025-06-06 | Published 2025-07-04 | Updated 2025-07-08 | Assigner mitre




MEDIUM: 4.8CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L

Problem types

CWE-125 Out-of-bounds Read

Product status

Default status
unaffected

3.3.0 (custom) before 3.6.4
affected

References

github.com/...isories/mbedtls-security-advisory-2025-06-4.md

cve.org (CVE-2025-49601)

nvd.nist.gov (CVE-2025-49601)

Download JSON