CVE-2022-42905Out-of-bounds Read in Wolfssl

CWE-125Out-of-bounds Read6 documents5 sources
Severity
9.1CRITICALNVD
EPSS
6.1%
top 9.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 7
Latest updateJan 12

Description

In wolfSSL before 5.5.2, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS 1.3 client or network attacker can trigger a buffer over-read on the heap of 5 bytes. (WOLFSSL_CALLBACKS is only intended for debugging.)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploitability: 3.9 | Impact: 5.2

Affected Packages3 packages

debiandebian/wolfssl< wolfssl 5.5.3-1 (bookworm)
NVDwolfssl/wolfssl< 5.5.2
Debianwolfssl/wolfssl< 4.6.0+p1-0+deb11u2+3

🔴Vulnerability Details

2
GHSA
GHSA-h6wv-v27f-f93r: In wolfSSL before 52022-11-07
OSV
CVE-2022-42905: In wolfSSL before 52022-11-07

📋Vendor Advisories

1
Debian
CVE-2022-42905: wolfssl - In wolfSSL before 5.5.2, if callback functions are enabled (via the WOLFSSL_CALL...2022

🕵️Threat Intelligence

2
Trailofbits
Keeping the wolves out of wolfSSL2023-01-12
Trailofbits
Keeping the wolves out of wolfSSL2023-01-12
CVE-2022-42905 — Out-of-bounds Read in Wolfssl | cvebase