Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-11933

Опубликовано: 21 нояб. 2025
Источник: debian
EPSS Низкий

Описание

Improper Input Validation in the TLS 1.3 CKS extension parsing in wolfSSL 5.8.2 and earlier on multiple platforms allows a remote unauthenticated attacker to potentially cause a denial-of-service via a crafted ClientHello message with duplicate CKS extensions.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wolfsslfixed5.8.4-1package
wolfsslno-dsatrixiepackage
wolfsslno-dsabookwormpackage
wolfsslpostponedbullseyepackage

Примечания

  • https://github.com/wolfSSL/wolfssl/pull/9132

  • Fixed by: https://github.com/wolfSSL/wolfssl/commit/2885df68b4f55961548d3a292128613c18e6774b (v5.8.4-stable)

EPSS

Процентиль: 12%
0.00041
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
3 месяца назад

Improper Input Validation in the TLS 1.3 CKS extension parsing in wolfSSL 5.8.2 and earlier on multiple platforms allows a remote unauthenticated attacker to potentially cause a denial-of-service via a crafted ClientHello message with duplicate CKS extensions.

CVSS3: 6.5
nvd
3 месяца назад

Improper Input Validation in the TLS 1.3 CKS extension parsing in wolfSSL 5.8.2 and earlier on multiple platforms allows a remote unauthenticated attacker to potentially cause a denial-of-service via a crafted ClientHello message with duplicate CKS extensions.

msrc
около 2 месяцев назад

DoS Vulnerability in wolfSSL TLS 1.3 CKS Extension

CVSS3: 6.5
github
3 месяца назад

Improper Input Validation in the TLS 1.3 CKS extension parsing in wolfSSL 5.8.2 and earlier on multiple platforms allows a remote unauthenticated attacker to potentially cause a denial-of-service via a crafted ClientHello message with duplicate CKS extensions.

EPSS

Процентиль: 12%
0.00041
Низкий