High severity7.5NVD Advisory· Published Mar 10, 2017· Updated May 13, 2026
CVE-2017-5872
CVE-2017-5872
Description
The TCP/IP networking module in Unisys ClearPath MCP systems with TCP-IP-SW 57.1 before 57.152, 58.1 before 58.142, or 59.1 before 59.172, when running a TLS 1.2 service, allows remote attackers to cause a denial of service (network connectivity disruption) via a client hello with a signature_algorithms extension above those defined in RFC 5246, which triggers a full memory dump.
Affected products
3cpe:2.3:a:unisys:clearpath_mcp:57.1:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:unisys:clearpath_mcp:57.1:*:*:*:*:*:*:*
- cpe:2.3:a:unisys:clearpath_mcp:58.1:*:*:*:*:*:*:*
- cpe:2.3:a:unisys:clearpath_mcp:59.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- www.securityfocus.com/bid/96782nvdThird Party AdvisoryVDB Entry
- public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspxnvdVendor Advisory
News mentions
0No linked articles in our index yet.