First published: Sat Nov 09 2019(Updated: )
In wolfSSL 4.1.0 through 4.2.0c, there are missing sanity checks of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer overflow inside the DecodedCert structure in GetName in wolfcrypt/src/asn.c because the domain name location index is mishandled. Because a pointer is overwritten, there is an invalid free.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WolfSSL wolfssl | >=4.1.0<=4.2.0c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18840 is a vulnerability in wolfSSL versions 4.1.0 through 4.2.0c that allows for a one-byte heap-based buffer overflow during ASN.1 certificate data parsing.
CVE-2019-18840 has a severity rating of 7.5, indicating a high severity.
wolfSSL versions 4.1.0 through 4.2.0c are affected by CVE-2019-18840.
To fix CVE-2019-18840, users are advised to update to a version of wolfSSL that is higher than 4.2.0c.
More information about CVE-2019-18840 can be found at the following reference link: [https://github.com/wolfSSL/wolfssl/issues/2555](https://github.com/wolfSSL/wolfssl/issues/2555)