Wolfssl

Wolfssl

111 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 09.04.2026 23:17:01
  • Zuletzt bearbeitet 29.04.2026 14:08:46

A stack buffer overflow exists in wolfSSL's PKCS7 implementation in the wc_PKCS7_DecryptOri() function in wolfcrypt/src/pkcs7.c. When processing a CMS EnvelopedData message containing an OtherRecipientInfo (ORI) recipient, the function copies an ASN....

  • EPSS 0.05%
  • Veröffentlicht 09.04.2026 23:17:01
  • Zuletzt bearbeitet 27.04.2026 17:53:27

In TLSX_EchChangeSNI, the ctx->extensions branch set extensions unconditionally even when TLSX_Find returned NULL. This caused TLSX_UseSNI to attach the attacker-controlled publicName to the shared WOLFSSL_CTX when no inner SNI was configured. TLSX_E...

Medienbericht
  • EPSS 0.02%
  • Veröffentlicht 09.04.2026 23:17:01
  • Zuletzt bearbeitet 29.04.2026 14:06:58

A padding oracle exists in wolfSSL's PKCS7 CBC decryption that could allow an attacker to recover plaintext through repeated decryption queries with modified ciphertext. In previous versions of wolfSSL the interior padding bytes are not validated.

  • EPSS 0.02%
  • Veröffentlicht 09.04.2026 23:17:01
  • Zuletzt bearbeitet 29.04.2026 14:05:22

When restoring a session from cache, a pointer from the serialized session data is used in a free operation without validation. An attacker who can poison the session cache could trigger an arbitrary free. Exploitation requires the ability to inject ...

  • EPSS 0.05%
  • Veröffentlicht 09.04.2026 22:16:37
  • Zuletzt bearbeitet 29.04.2026 14:50:39

Integer underflow in wolfSSL packet sniffer <= 5.9.0 allows an attacker to cause a program crash in the AEAD decryption path by injecting a TLS record shorter than the explicit IV plus authentication tag into traffic inspected by ssl_DecodePacket. Th...

  • EPSS 0.02%
  • Veröffentlicht 09.04.2026 22:16:36
  • Zuletzt bearbeitet 29.04.2026 17:19:55

URI nameConstraints from constrained intermediate CAs are parsed but not enforced during certificate chain verification in wolfcrypt/src/asn.c. A compromised or malicious sub-CA could issue leaf certificates with URI SAN entries that violate the name...

Medienbericht
  • EPSS 0.14%
  • Veröffentlicht 09.04.2026 22:16:36
  • Zuletzt bearbeitet 29.04.2026 17:18:21

Heap buffer overflow in DTLS 1.3 ACK message processing. A remote attacker can send a crafted DTLS 1.3 ACK message that triggers a heap buffer overflow.

  • EPSS 0.05%
  • Veröffentlicht 09.04.2026 22:16:36
  • Zuletzt bearbeitet 29.04.2026 14:52:45

A 1-byte stack buffer over-read was identified in the MatchDomainName function (src/internal.c) during wildcard hostname validation when the LEFT_MOST_WILDCARD_ONLY flag is active. If a wildcard * exhausts the entire hostname string, the function re...

  • EPSS 0.04%
  • Veröffentlicht 09.04.2026 21:16:13
  • Zuletzt bearbeitet 29.04.2026 17:21:51

Heap buffer overflow in CertFromX509 via AuthorityKeyIdentifier size confusion. A heap buffer overflow occurs when converting an X.509 certificate internally due to incorrect size handling of the AuthorityKeyIdentifier extension.

  • EPSS 0.04%
  • Veröffentlicht 09.04.2026 21:16:12
  • Zuletzt bearbeitet 29.04.2026 17:25:21

In wolfSSL, ARIA-GCM cipher suites used in TLS 1.2 and DTLS 1.2 reuse an identical 12-byte GCM nonce for every application-data record. Because wc_AriaEncrypt is stateless and passes the caller-supplied IV verbatim to the MagicCrypto SDK with no inte...