CVE-2024-5991 — Out-of-bounds Read in Wolfssl
Severity
10.0CRITICALNVD
EPSS
0.1%
top 70.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 27
Description
In function MatchDomainName(), input param str is treated as a NULL terminated string despite being user provided and unchecked. Specifically, the function X509_check_host() takes in a pointer and length to check against, with no requirements that it be NULL terminated. If a caller was attempting to do a name check on a non-NULL terminated buffer, the code would read beyond the bounds of the input array until it found a NULL terminator.This issue affects wolfSSL: through 5.7.0.
CVSS vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected Packages9 packages
Patches
🔴Vulnerability Details
2OSV▶
CVE-2024-5991: In function MatchDomainName(), input param str is treated as a NULL terminated string despite being user provided and unchecked↗2024-08-27
GHSA▶
GHSA-jwjf-h4v6-qrpp: In function MatchDomainName(), input param str is treated as a NULL terminated string despite being user provided and unchecked↗2024-08-27