First published: Tue Jan 28 2020(Updated: )
The SSL 3 HMAC functionality in wolfSSL CyaSSL 2.5.0 before 2.9.4 does not check the padding length when verification fails, which allows remote attackers to have unspecified impact via a crafted HMAC, which triggers an out-of-bounds read.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WolfSSL wolfssl | >=2.5.0<2.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2014-2897.
The severity of CVE-2014-2897 is critical with a severity value of 9.8.
The affected software for CVE-2014-2897 is wolfSSL CyaSSL version 2.5.0 before 2.9.4.
The impact of CVE-2014-2897 is unspecified but can have an out-of-bounds read if exploited.
To fix the vulnerability in CVE-2014-2897, update wolfSSL CyaSSL to version 2.9.4 or later.