Man-in-the-Middle Vulnerability in wolfSSL Product
CVE-2022-38153
5.9MEDIUM
Summary
A vulnerability has been identified in wolfSSL that allows man-in-the-middle attackers to disrupt TLS 1.2 clients during the handshake process. By injecting an oversized ticket into a NewSessionTicket message, the session cache may attempt to free an unallocated pointer, leading to a crash with a 'free(): invalid pointer' error. This exploit primarily affects wolfSSL version 5.3.0, while subsequent versions may offer mitigations. It is worth noting that this vulnerability may also have implications for TLS 1.3 handshakes, although it cannot be leveraged in that context. Users are advised to update to secure versions and review their configuration for potential exposure.
References
CVSS V3.1
Score:
5.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved