First published: Tue Aug 27 2024(Updated: )
In function MatchDomainName(), input param str is treated as a NULL terminated string despite being user provided and unchecked. Specifically, the function X509_check_host() takes in a pointer and length to check against, with no requirements that it be NULL terminated. If a caller was attempting to do a name check on a non-NULL terminated buffer, the code would read beyond the bounds of the input array until it found a NULL terminator.This issue affects wolfSSL: through 5.7.0.
Credit: facts@wolfssl.com
Affected Software | Affected Version | How to fix |
---|---|---|
wolfSSL wolfMQTT | <=5.7.0 |
Fixed in the following github pull request https://https://github.com/wolfSSL/wolfssl/pull/7604
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-5991 is currently classified as high due to the potential for denial of service or security bypass.
To fix CVE-2024-5991, upgrade to a version of wolfSSL later than 5.7.0 that addresses this vulnerability.
CVE-2024-5991 affects all versions of wolfSSL up to and including 5.7.0.
CVE-2024-5991 describes a vulnerability in the MatchDomainName() function where unchecked user input is treated as a NULL terminated string.
Yes, CVE-2024-5991 has the potential to be exploited remotely due to improper handling of user input.