First published: Mon Jan 09 2023(Updated: )
MatrixSSL 4.0.4 through 4.5.1 has an integer overflow in matrixSslDecodeTls13. A remote attacker might be able to send a crafted TLS Message to cause a buffer overflow and achieve remote code execution. This is fixed in 4.6.0.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Matrixssl Matrixssl | >=4.0.0<4.6.0 | |
>=4.0.0<4.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43974 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2022-43974, upgrade MatrixSSL to version 4.6.0 or later.
CVE-2022-43974 is caused by an integer overflow in the matrixSslDecodeTls13 function.
Yes, CVE-2022-43974 can be exploited remotely by sending a crafted TLS message.
MatrixSSL versions 4.0.4 through 4.5.1 are affected by CVE-2022-43974.