Out-of-bounds Read Affecting wolfssl package, versions *


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.05% (19th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-WOLFSSL-7844767
  • published28 Aug 2024
  • disclosed27 Aug 2024

Introduced: 27 Aug 2024

CVE-2024-5991  (opens in a new tab)
CWE-125  (opens in a new tab)

How to fix?

There is no fixed version for Debian:11 wolfssl.

NVD Description

Note: Versions mentioned in the description apply only to the upstream wolfssl package and not the wolfssl package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

In function MatchDomainName(), input param str is treated as a NULL terminated string despite being user provided and unchecked. Specifically, the function X509_check_host() takes in a pointer and length to check against, with no requirements that it be NULL terminated. If a caller was attempting to do a name check on a non-NULL terminated buffer, the code would read beyond the bounds of the input array until it found a NULL terminator.This issue affects wolfSSL: through 5.7.0.

CVSS Scores

version 3.1