Lucene search

K
cve[email protected]CVE-2022-42905
HistoryNov 07, 2022 - 12:15 a.m.

CVE-2022-42905

2022-11-0700:15:09
CWE-125
web.nvd.nist.gov
79
19
wolfssl
cve-2022-42905
buffer over-read
security vulnerability
nvd

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

9.3 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.0%

In wolfSSL before 5.5.2, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS 1.3 client or network attacker can trigger a buffer over-read on the heap of 5 bytes. (WOLFSSL_CALLBACKS is only intended for debugging.)

Affected configurations

NVD
Node
wolfsslwolfsslRange<5.5.2
CPENameOperatorVersion
wolfssl:wolfsslwolfssllt5.5.2

Social References

More

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

9.3 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.0%