Wolfssl

Wolfssl

89 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 8.89%
  • Veröffentlicht 24.05.2017 14:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

A specially crafted x509 certificate can cause a single out of bounds byte overwrite in wolfSSL through 3.10.2 resulting in potential certificate validation vulnerabilities, denial of service and possible remote code execution. In order to trigger th...

  • EPSS 0.32%
  • Veröffentlicht 09.05.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

wolfSSL before 3.11.0 does not prevent wc_DhAgree from accepting a malformed DH key.

  • EPSS 0.27%
  • Veröffentlicht 09.05.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

wolfSSL before 3.10.2 has an out-of-bounds memory access with loading crafted DH parameters, aka a buffer overflow triggered by a malformed temporary DH file.

  • EPSS 0.15%
  • Veröffentlicht 24.02.2017 02:59:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In versions of wolfSSL before 3.10.2 the function fp_mul_comba makes it easier to extract RSA key information for a malicious user who has access to view cache on a machine.

  • EPSS 0.08%
  • Veröffentlicht 13.12.2016 16:59:10
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The C software implementation of AES Encryption and Decryption in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover AES keys by leveraging cache-bank timing differences.

  • EPSS 0.13%
  • Veröffentlicht 13.12.2016 16:59:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The C software implementation of RSA in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover RSA keys by leveraging cache-bank hit differences.

  • EPSS 0.13%
  • Veröffentlicht 13.12.2016 16:59:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The C software implementation of ECC in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover RSA keys by leveraging cache-bank hit differences.

Exploit
  • EPSS 2.68%
  • Veröffentlicht 22.01.2016 15:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

wolfSSL (formerly CyaSSL) before 3.6.8 does not properly handle faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote att...

Exploit
  • EPSS 0.9%
  • Veröffentlicht 22.01.2016 15:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

wolfSSL (formerly CyaSSL) before 3.6.8 allows remote attackers to cause a denial of service (resource consumption or traffic amplification) via a crafted DTLS cookie in a ClientHello message.