Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-24585

Опубликовано: 21 авг. 2020
Источник: debian
EPSS Низкий

Описание

An issue was discovered in the DTLS handshake implementation in wolfSSL before 4.5.0. Clear DTLS application_data messages in epoch 0 do not produce an out-of-order error. Instead, these messages are returned to the application.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wolfsslfixed4.5.0+dfsg-1package

Примечания

  • https://github.com/wolfSSL/wolfssl/pull/3219

  • https://github.com/wolfSSL/wolfssl/commit/3be7f3ea3a56d178acf0f7f84ee4ae8cbfee8915 (v4.5.0-stable)

EPSS

Процентиль: 47%
0.00237
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 5 лет назад

An issue was discovered in the DTLS handshake implementation in wolfSSL before 4.5.0. Clear DTLS application_data messages in epoch 0 do not produce an out-of-order error. Instead, these messages are returned to the application.

CVSS3: 5.3
nvd
больше 5 лет назад

An issue was discovered in the DTLS handshake implementation in wolfSSL before 4.5.0. Clear DTLS application_data messages in epoch 0 do not produce an out-of-order error. Instead, these messages are returned to the application.

github
больше 3 лет назад

An issue was discovered in the DTLS handshake implementation in wolfSSL before 4.5.0. Clear DTLS application_data messages in epoch 0 do not produce an out-of-order error. Instead, these messages are returned to the application.

EPSS

Процентиль: 47%
0.00237
Низкий