CVE-2023-6936Out-of-bounds Read in Wolfssl

Severity
9.1CRITICALNVD
EPSS
0.3%
top 49.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 20
Latest updateFeb 21

Description

In wolfSSL prior to 5.6.6, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS client or network attacker can trigger a buffer over-read on the heap of 5 bytes (WOLFSSL_CALLBACKS is only intended for debugging).

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploitability: 3.9 | Impact: 5.2

Affected Packages10 packages

debiandebian/wolfssl< wolfssl 5.6.6-1.2 (forky)
NVDwolfssl/wolfssl< 5.6.6
Debianwolfssl/wolfssl< 5.6.6-1.2+1
CVEListV5wolfssl/wolfssl5.6.5

Patches

🔴Vulnerability Details

2
GHSA
GHSA-cwpg-8775-j56v: In wolfSSL prior to 52024-02-21
OSV
CVE-2023-6936: In wolfSSL prior to 52024-02-20

📋Vendor Advisories

2
Microsoft
Heap-buffer over-read with WOLFSSL_CALLBACKS2024-02-13
Debian
CVE-2023-6936: wolfssl - In wolfSSL prior to 5.6.6, if callback functions are enabled (via the WOLFSSL_CA...2023
CVE-2023-6936 — Out-of-bounds Read in Wolfssl | cvebase