First published: Sun Nov 06 2022(Updated: )
In wolfSSL before 5.5.2, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS 1.3 client or network attacker can trigger a buffer over-read on the heap of 5 bytes. (WOLFSSL_CALLBACKS is only intended for debugging.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WolfSSL wolfssl | <5.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this wolfSSL vulnerability is CVE-2022-42905.
The severity rating of CVE-2022-42905 is critical with a score of 9.1.
The vulnerability in wolfSSL before 5.5.2 occurs when callback functions are enabled (via the WOLFSSL_CALLBACKS flag), allowing a malicious TLS 1.3 client or network attacker to trigger a 5-byte buffer over-read on the heap.
This vulnerability affects wolfSSL versions up to (but not including) 5.5.2.
Yes, the following references are available for this vulnerability: [1] http://packetstormsecurity.com/files/170610/wolfSSL-WOLFSSL_CALLBACKS-Heap-Buffer-Over-Read.html, [2] http://seclists.org/fulldisclosure/2023/Jan/11, [3] https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/