Wolfssl

Wolfssl

73 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.19%
  • Veröffentlicht 03.01.2019 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:29

It was found that wolfssl before 3.15.7 is vulnerable to a new variant of the Bleichenbacher attack to perform downgrade attacks against TLS. This may lead to leakage of sensible data.

  • EPSS 0.14%
  • Veröffentlicht 15.06.2018 02:29:00
  • Zuletzt bearbeitet 21.11.2024 03:45:13

wolfcrypt/src/ecc.c in wolfSSL before 3.15.1.patch allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or...

  • EPSS 70.02%
  • Veröffentlicht 13.12.2017 01:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

wolfSSL prior to version 3.12.2 provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable wolfSSL application. This vulnerability is referred to as ...

  • EPSS 0.21%
  • Veröffentlicht 06.10.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

CyaSSL does not check the key usage extension in leaf certificates, which allows remote attackers to spoof servers via a crafted server certificate not authorized for use in an SSL/TLS handshake.

Exploit
  • EPSS 14.19%
  • Veröffentlicht 24.05.2017 14:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

A specially crafted x509 certificate can cause a single out of bounds byte overwrite in wolfSSL through 3.10.2 resulting in potential certificate validation vulnerabilities, denial of service and possible remote code execution. In order to trigger th...

  • EPSS 0.32%
  • Veröffentlicht 09.05.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

wolfSSL before 3.11.0 does not prevent wc_DhAgree from accepting a malformed DH key.

  • EPSS 0.27%
  • Veröffentlicht 09.05.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

wolfSSL before 3.10.2 has an out-of-bounds memory access with loading crafted DH parameters, aka a buffer overflow triggered by a malformed temporary DH file.

  • EPSS 0.15%
  • Veröffentlicht 24.02.2017 02:59:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In versions of wolfSSL before 3.10.2 the function fp_mul_comba makes it easier to extract RSA key information for a malicious user who has access to view cache on a machine.

  • EPSS 0.11%
  • Veröffentlicht 13.12.2016 16:59:10
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The C software implementation of AES Encryption and Decryption in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover AES keys by leveraging cache-bank timing differences.

  • EPSS 0.13%
  • Veröffentlicht 13.12.2016 16:59:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The C software implementation of RSA in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover RSA keys by leveraging cache-bank hit differences.