Buffer Over-Read Vulnerability in wolfSSL Prior to 5.6.6
CVE-2023-6936
9.1CRITICAL
Summary
In wolfSSL versions prior to 5.6.6, enabling callback functions through the WOLFSSL_CALLBACKS flag can expose the application to a buffer over-read vulnerability. This flaw allows a malicious TLS client or a network attacker to manipulate the memory on the heap, leading to unauthorized access to sensitive information during TLS communication. This vulnerability is particularly concerning as the callback feature is primarily meant for debugging purposes and should not be employed in production environments. Users are strongly advised to update to the latest version to mitigate this risk.
Affected Version(s)
wolfSSL 0 <= 5.6.5
References
CVSS V3.1
Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Lucca Hirschi (Inria, LORIA)
Steve Kremer (Inria, LORIA)
Max Ammann (Trail of Bits)
tlspuffin