Описание
In wolfSSL prior to 5.6.6, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS client or network attacker can trigger a buffer over-read on the heap of 5 bytes (WOLFSSL_CALLBACKS is only intended for debugging).
Ссылки
- Issue TrackingPatch
- Vendor Advisory
- Issue TrackingPatch
- Vendor Advisory
Уязвимые конфигурации
EPSS
5.3 Medium
CVSS3
9.1 Critical
CVSS3
Дефекты
Связанные уязвимости
In wolfSSL prior to 5.6.6, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS client or network attacker can trigger a buffer over-read on the heap of 5 bytes (WOLFSSL_CALLBACKS is only intended for debugging).
In wolfSSL prior to 5.6.6, if callback functions are enabled (via the ...
In wolfSSL prior to 5.6.6, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS client or network attacker can trigger a buffer over-read on the heap of 5 bytes (WOLFSSL_CALLBACKS is only intended for debugging).
EPSS
5.3 Medium
CVSS3
9.1 Critical
CVSS3