CVE-2014-2902
- EPSS 0.22%
- Veröffentlicht 21.11.2019 23:15:11
- Zuletzt bearbeitet 21.11.2024 02:07:10
wolfssl before 3.2.0 does not properly authorize CA certificate for signing other certificates.
CVE-2014-2904
- EPSS 0.23%
- Veröffentlicht 21.11.2019 23:15:11
- Zuletzt bearbeitet 21.11.2024 02:07:10
wolfssl before 3.2.0 has a server certificate that is not properly authorized for server authentication.
CVE-2019-18840
- EPSS 0.41%
- Veröffentlicht 09.11.2019 13:15:10
- Zuletzt bearbeitet 21.11.2024 04:33:41
In wolfSSL 4.1.0 through 4.2.0c, there are missing sanity checks of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer overflow inside the DecodedCert structure in GetName in wolfc...
CVE-2019-13628
- EPSS 0.15%
- Veröffentlicht 03.10.2019 14:15:11
- Zuletzt bearbeitet 21.11.2024 04:25:23
wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of si...
CVE-2019-16748
- EPSS 0.4%
- Veröffentlicht 24.09.2019 13:15:10
- Zuletzt bearbeitet 21.11.2024 04:31:06
In wolfSSL through 4.1.0, there is a missing sanity check of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer over-read in CheckCertSignature_ex in wolfcrypt/src/asn.c.
CVE-2019-15651
- EPSS 0.23%
- Veröffentlicht 26.08.2019 22:15:11
- Zuletzt bearbeitet 21.11.2024 04:29:12
wolfSSL 4.1.0 has a one-byte heap-based buffer over-read in DecodeCertExtensions in wolfcrypt/src/asn.c because reading the ASN_BOOLEAN byte is mishandled for a crafted DER certificate in GetLength_ex.
CVE-2019-11873
- EPSS 6.34%
- Veröffentlicht 23.05.2019 13:29:07
- Zuletzt bearbeitet 21.11.2024 04:21:56
wolfSSL 4.0.0 has a Buffer Overflow in DoPreSharedKeys in tls13.c when a current identity size is greater than a client identity size. An attacker sends a crafted hello client packet over the network to a TLSv1.3 wolfSSL server. The length fields of ...
CVE-2019-6439
- EPSS 1.14%
- Veröffentlicht 16.01.2019 03:29:00
- Zuletzt bearbeitet 21.11.2024 04:46:27
examples/benchmark/tls_bench.c in a benchmark tool in wolfSSL through 3.15.7 has a heap-based buffer overflow.
CVE-2018-16870
- EPSS 0.19%
- Veröffentlicht 03.01.2019 16:29:00
- Zuletzt bearbeitet 21.11.2024 03:53:29
It was found that wolfssl before 3.15.7 is vulnerable to a new variant of the Bleichenbacher attack to perform downgrade attacks against TLS. This may lead to leakage of sensible data.
CVE-2018-12436
- EPSS 0.14%
- Veröffentlicht 15.06.2018 02:29:00
- Zuletzt bearbeitet 21.11.2024 03:45:13
wolfcrypt/src/ecc.c in wolfSSL before 3.15.1.patch allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or...