Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-6936

Опубликовано: 20 фев. 2024
Источник: debian
EPSS Низкий

Описание

In wolfSSL prior to 5.6.6, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS client or network attacker can trigger a buffer over-read on the heap of 5 bytes (WOLFSSL_CALLBACKS is only intended for debugging).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wolfsslfixed5.6.6-1experimentalpackage
wolfsslfixed5.6.6-1.2package
wolfsslno-dsabookwormpackage
wolfsslno-dsabullseyepackage

Примечания

  • https://github.com/wolfSSL/wolfssl/blob/v5.6.6-stable/ChangeLog.md#vulnerabilities

EPSS

Процентиль: 49%
0.00255
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 2 года назад

In wolfSSL prior to 5.6.6, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS client or network attacker can trigger a buffer over-read on the heap of 5 bytes (WOLFSSL_CALLBACKS is only intended for debugging).

CVSS3: 5.3
nvd
почти 2 года назад

In wolfSSL prior to 5.6.6, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS client or network attacker can trigger a buffer over-read on the heap of 5 bytes (WOLFSSL_CALLBACKS is only intended for debugging).

CVSS3: 9.1
msrc
около 1 года назад

Описание отсутствует

CVSS3: 5.3
github
почти 2 года назад

In wolfSSL prior to 5.6.6, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS client or network attacker can trigger a buffer over-read on the heap of 5 bytes (WOLFSSL_CALLBACKS is only intended for debugging).

EPSS

Процентиль: 49%
0.00255
Низкий