CVE-2024-5991
- EPSS 0.11%
- Veröffentlicht 27.08.2024 19:15:18
- Zuletzt bearbeitet 06.09.2024 22:51:41
In function MatchDomainName(), input param str is treated as a NULL terminated string despite being user provided and unchecked. Specifically, the function X509_check_host() takes in a pointer and length to check against, with no requirements that it...
CVE-2024-5814
- EPSS 0.22%
- Veröffentlicht 27.08.2024 19:15:17
- Zuletzt bearbeitet 06.12.2025 00:54:13
A malicious TLS1.2 server can force a TLS1.3 client with downgrade capability to use a ciphersuite that it did not agree to and achieve a successful connection. This is because, aside from the extensions, the client was skipping fully parsing the ser...
CVE-2024-5288
- EPSS 0.09%
- Veröffentlicht 27.08.2024 19:15:17
- Zuletzt bearbeitet 20.02.2025 21:10:36
An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys, such as in server-side TLS conn...
CVE-2024-1544
- EPSS 0.08%
- Veröffentlicht 27.08.2024 19:15:16
- Zuletzt bearbeitet 27.01.2026 22:15:51
Generating the ECDSA nonce k samples a random number r and then truncates this randomness with a modular reduction mod n where n is the order of the elliptic curve. Meaning k = r mod n. The division used during the reduction estimates a factor q_e...
CVE-2024-0901
- EPSS 0.23%
- Veröffentlicht 25.03.2024 23:15:51
- Zuletzt bearbeitet 15.12.2025 21:42:52
Remotely executed SEGV and out of bounds read allows malicious packet sender to crash or cause an out of bounds read via sending a malformed packet with the correct length.
CVE-2023-6936
- EPSS 0.27%
- Veröffentlicht 20.02.2024 22:15:08
- Zuletzt bearbeitet 26.03.2025 17:15:23
In wolfSSL prior to 5.6.6, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS client or network attacker can trigger a buffer over-read on the heap of 5 bytes (WOLFSSL_CALLBACKS is only intended for debugging).
CVE-2023-6937
- EPSS 0.44%
- Veröffentlicht 15.02.2024 18:15:44
- Zuletzt bearbeitet 21.02.2025 15:03:59
wolfSSL prior to 5.6.6 did not check that messages in one (D)TLS record do not span key boundaries. As a result, it was possible to combine (D)TLS messages using different keys into one (D)TLS record. The most extreme edge case is that, in (D)TLS 1.3...
CVE-2023-6935
- EPSS 0.32%
- Veröffentlicht 09.02.2024 23:15:08
- Zuletzt bearbeitet 21.11.2024 08:44:52
wolfSSL SP Math All RSA implementation is vulnerable to the Marvin Attack, new variation of a timing Bleichenbacher style attack, when built with the following options to configure: --enable-all CFLAGS="-DWOLFSSL_STATIC_RSA" The define “WOLFSSL_STA...
CVE-2023-3724
- EPSS 0.11%
- Veröffentlicht 17.07.2023 22:15:09
- Zuletzt bearbeitet 21.11.2024 08:17:55
If a TLS 1.3 client gets neither a PSK (pre shared key) extension nor a KSE (key share extension) when connecting to a malicious server, a default predictable buffer gets used for the IKM (Input Keying Material) value when generating the session mast...
CVE-2022-42905
- EPSS 6.14%
- Veröffentlicht 07.11.2022 00:15:09
- Zuletzt bearbeitet 02.05.2025 19:15:54
In wolfSSL before 5.5.2, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS 1.3 client or network attacker can trigger a buffer over-read on the heap of 5 bytes. (WOLFSSL_CALLBACKS is only intended for debugging....