Логотип exploitDog
bind:CVE-2026-2646
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-2646

Количество 3

Количество 3

nvd логотип

CVE-2026-2646

7 дней назад

A heap-buffer-overflow vulnerability exists in wolfSSL's wolfSSL_d2i_SSL_SESSION() function. When deserializing session data with SESSION_CERTS enabled, certificate and session id lengths are read from an untrusted input without bounds validation, allowing an attacker to overflow fixed-size buffers and corrupt heap memory. A maliciously crafted session would need to be loaded from an external source to trigger this vulnerability. Internal sessions were not vulnerable.

EPSS: Низкий
msrc логотип

CVE-2026-2646

2 дня назад

Heap buffer overflow in session parsing with wolfSSL_d2i_SSL_SESSION() function

EPSS: Низкий
github логотип

GHSA-24vq-qfc5-qrmj

7 дней назад

A heap-buffer-overflow vulnerability exists in wolfSSL's wolfSSL_d2i_SSL_SESSION() function. When deserializing session data with SESSION_CERTS enabled, certificate and session id lengths are read from an untrusted input without bounds validation, allowing an attacker to overflow fixed-size buffers and corrupt heap memory. A maliciously crafted session would need to be loaded from an external source to trigger this vulnerability. Internal sessions were not vulnerable.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-2646

A heap-buffer-overflow vulnerability exists in wolfSSL's wolfSSL_d2i_SSL_SESSION() function. When deserializing session data with SESSION_CERTS enabled, certificate and session id lengths are read from an untrusted input without bounds validation, allowing an attacker to overflow fixed-size buffers and corrupt heap memory. A maliciously crafted session would need to be loaded from an external source to trigger this vulnerability. Internal sessions were not vulnerable.

0%
Низкий
7 дней назад
msrc логотип
CVE-2026-2646

Heap buffer overflow in session parsing with wolfSSL_d2i_SSL_SESSION() function

0%
Низкий
2 дня назад
github логотип
GHSA-24vq-qfc5-qrmj

A heap-buffer-overflow vulnerability exists in wolfSSL's wolfSSL_d2i_SSL_SESSION() function. When deserializing session data with SESSION_CERTS enabled, certificate and session id lengths are read from an untrusted input without bounds validation, allowing an attacker to overflow fixed-size buffers and corrupt heap memory. A maliciously crafted session would need to be loaded from an external source to trigger this vulnerability. Internal sessions were not vulnerable.

0%
Низкий
7 дней назад

Уязвимостей на страницу