Buffer Over-Read Vulnerability in wolfSSL Prior to 5.6.6
CVE-2023-6936

9.1CRITICAL

Key Information:

Vendor
Wolfssl
Status
Vendor
CVE Published:
20 February 2024

Summary

In wolfSSL versions prior to 5.6.6, enabling callback functions through the WOLFSSL_CALLBACKS flag can expose the application to a buffer over-read vulnerability. This flaw allows a malicious TLS client or a network attacker to manipulate the memory on the heap, leading to unauthorized access to sensitive information during TLS communication. This vulnerability is particularly concerning as the callback feature is primarily meant for debugging purposes and should not be employed in production environments. Users are strongly advised to update to the latest version to mitigate this risk.

Affected Version(s)

wolfSSL 0 <= 5.6.5

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Lucca Hirschi (Inria, LORIA)
Steve Kremer (Inria, LORIA)
Max Ammann (Trail of Bits)
tlspuffin
.