First published: Tue Jan 28 2020(Updated: )
The DoAlert function in the (1) TLS and (2) DTLS implementations in wolfSSL CyaSSL before 2.9.4 allows remote attackers to have unspecified impact and vectors, which trigger memory corruption or an out-of-bounds read.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WolfSSL wolfssl | >=2.5.0<2.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-2896 is critical with a CVSS score of 9.8.
CVE-2014-2896 allows remote attackers to cause memory corruption or trigger an out-of-bounds read.
To fix CVE-2014-2896, you should update wolfSSL CyaSSL to version 2.9.4 or later.
wolfSSL CyaSSL versions from 2.5.0 to 2.9.4 are affected by CVE-2014-2896.
Yes, you can find references for CVE-2014-2896 at the following links: [link 1](http://seclists.org/oss-sec/2014/q2/126), [link 2](http://seclists.org/oss-sec/2014/q2/130), [link 3](http://www.wolfssl.com/yaSSL/Blog/Entries/2014/4/11_wolfSSL_Security_Advisory__April_9%2C_2014.html).