VYPR
High severity7.5NVD Advisory· Published Mar 10, 2017· Updated May 13, 2026

CVE-2017-5872

CVE-2017-5872

Description

The TCP/IP networking module in Unisys ClearPath MCP systems with TCP-IP-SW 57.1 before 57.152, 58.1 before 58.142, or 59.1 before 59.172, when running a TLS 1.2 service, allows remote attackers to cause a denial of service (network connectivity disruption) via a client hello with a signature_algorithms extension above those defined in RFC 5246, which triggers a full memory dump.

Affected products

3
  • cpe:2.3:a:unisys:clearpath_mcp:57.1:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:a:unisys:clearpath_mcp:57.1:*:*:*:*:*:*:*
    • cpe:2.3:a:unisys:clearpath_mcp:58.1:*:*:*:*:*:*:*
    • cpe:2.3:a:unisys:clearpath_mcp:59.1:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.