CVE-2017-5872
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
10/03/2017
Last modified:
20/04/2025
Description
The TCP/IP networking module in Unisys ClearPath MCP systems with TCP-IP-SW 57.1 before 57.152, 58.1 before 58.142, or 59.1 before 59.172, when running a TLS 1.2 service, allows remote attackers to cause a denial of service (network connectivity disruption) via a client hello with a signature_algorithms extension above those defined in RFC 5246, which triggers a full memory dump.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:unisys:clearpath_mcp:57.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:unisys:clearpath_mcp:58.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:unisys:clearpath_mcp:59.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



