CVE-2019-19962
- EPSS 0.18%
- Published 25.12.2019 00:15:10
- Last modified 21.11.2024 04:35:45
wolfSSL before 4.3.0 mishandles calls to wc_SignatureGenerateHash, leading to fault injection in RSA cryptography.
CVE-2019-19960
- EPSS 0.36%
- Published 25.12.2019 00:15:10
- Last modified 21.11.2024 04:35:45
In wolfSSL before 4.3.0, wc_ecc_mulmod_ex does not properly resist side-channel attacks.
CVE-2019-14317
- EPSS 0.39%
- Published 11.12.2019 18:16:18
- Last modified 21.11.2024 04:26:28
wolfSSL and wolfCrypt 4.1.0 and earlier (formerly known as CyaSSL) generate biased DSA nonces. This allows a remote attacker to compute the long term private key from several hundred DSA signatures via a lattice attack. The issue occurs because dsa.c...
CVE-2014-2904
- EPSS 0.23%
- Published 21.11.2019 23:15:11
- Last modified 21.11.2024 02:07:10
wolfssl before 3.2.0 has a server certificate that is not properly authorized for server authentication.
CVE-2014-2902
- EPSS 0.22%
- Published 21.11.2019 23:15:11
- Last modified 21.11.2024 02:07:10
wolfssl before 3.2.0 does not properly authorize CA certificate for signing other certificates.
CVE-2014-2901
- EPSS 0.16%
- Published 21.11.2019 23:15:11
- Last modified 21.11.2024 02:07:09
wolfssl before 3.2.0 does not properly issue certificates for a server's hostname.
CVE-2019-18840
- EPSS 0.41%
- Published 09.11.2019 13:15:10
- Last modified 21.11.2024 04:33:41
In wolfSSL 4.1.0 through 4.2.0c, there are missing sanity checks of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer overflow inside the DecodedCert structure in GetName in wolfc...
CVE-2019-13628
- EPSS 0.15%
- Published 03.10.2019 14:15:11
- Last modified 21.11.2024 04:25:23
wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of si...
CVE-2019-16748
- EPSS 0.91%
- Published 24.09.2019 13:15:10
- Last modified 21.11.2024 04:31:06
In wolfSSL through 4.1.0, there is a missing sanity check of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer over-read in CheckCertSignature_ex in wolfcrypt/src/asn.c.
CVE-2019-15651
- EPSS 0.23%
- Published 26.08.2019 22:15:11
- Last modified 21.11.2024 04:29:12
wolfSSL 4.1.0 has a one-byte heap-based buffer over-read in DecodeCertExtensions in wolfcrypt/src/asn.c because reading the ASN_BOOLEAN byte is mishandled for a crafted DER certificate in GetLength_ex.