CVE-2019-18840
- EPSS 0.41%
- Veröffentlicht 09.11.2019 13:15:10
- Zuletzt bearbeitet 21.11.2024 04:33:41
In wolfSSL 4.1.0 through 4.2.0c, there are missing sanity checks of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer overflow inside the DecodedCert structure in GetName in wolfc...
CVE-2019-13628
- EPSS 0.15%
- Veröffentlicht 03.10.2019 14:15:11
- Zuletzt bearbeitet 21.11.2024 04:25:23
wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of si...
CVE-2019-16748
- EPSS 0.91%
- Veröffentlicht 24.09.2019 13:15:10
- Zuletzt bearbeitet 21.11.2024 04:31:06
In wolfSSL through 4.1.0, there is a missing sanity check of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer over-read in CheckCertSignature_ex in wolfcrypt/src/asn.c.
CVE-2019-15651
- EPSS 0.23%
- Veröffentlicht 26.08.2019 22:15:11
- Zuletzt bearbeitet 21.11.2024 04:29:12
wolfSSL 4.1.0 has a one-byte heap-based buffer over-read in DecodeCertExtensions in wolfcrypt/src/asn.c because reading the ASN_BOOLEAN byte is mishandled for a crafted DER certificate in GetLength_ex.
CVE-2019-11873
- EPSS 7.11%
- Veröffentlicht 23.05.2019 13:29:07
- Zuletzt bearbeitet 21.11.2024 04:21:56
wolfSSL 4.0.0 has a Buffer Overflow in DoPreSharedKeys in tls13.c when a current identity size is greater than a client identity size. An attacker sends a crafted hello client packet over the network to a TLSv1.3 wolfSSL server. The length fields of ...
CVE-2019-6439
- EPSS 1.14%
- Veröffentlicht 16.01.2019 03:29:00
- Zuletzt bearbeitet 21.11.2024 04:46:27
examples/benchmark/tls_bench.c in a benchmark tool in wolfSSL through 3.15.7 has a heap-based buffer overflow.
CVE-2018-16870
- EPSS 0.19%
- Veröffentlicht 03.01.2019 16:29:00
- Zuletzt bearbeitet 21.11.2024 03:53:29
It was found that wolfssl before 3.15.7 is vulnerable to a new variant of the Bleichenbacher attack to perform downgrade attacks against TLS. This may lead to leakage of sensible data.
CVE-2018-12436
- EPSS 0.14%
- Veröffentlicht 15.06.2018 02:29:00
- Zuletzt bearbeitet 21.11.2024 03:45:13
wolfcrypt/src/ecc.c in wolfSSL before 3.15.1.patch allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or...
CVE-2017-13099
- EPSS 78.46%
- Veröffentlicht 13.12.2017 01:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
wolfSSL prior to version 3.12.2 provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable wolfSSL application. This vulnerability is referred to as ...
CVE-2014-2903
- EPSS 0.21%
- Veröffentlicht 06.10.2017 15:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
CyaSSL does not check the key usage extension in leaf certificates, which allows remote attackers to spoof servers via a crafted server certificate not authorized for use in an SSL/TLS handshake.