Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-11873
HistoryMay 23, 2019 - 12:00 a.m.

CVE-2019-11873

2019-05-2300:00:00
ubuntu.com
ubuntu.com
8

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.098 Low

EPSS

Percentile

94.9%

wolfSSL 4.0.0 has a Buffer Overflow in DoPreSharedKeys in tls13.c when a
current identity size is greater than a client identity size. An attacker
sends a crafted hello client packet over the network to a TLSv1.3 wolfSSL
server. The length fields of the packet: record length, client hello
length, total extensions length, PSK extension length, total identity
length, and identity length contain their maximum value which is 2^16. The
identity data field of the PSK extension of the packet contains the attack
data, to be stored in the undefined memory (RAM) of the server. The size of
the data is about 65 kB. Possibly the attacker can perform a remote code
execution attack.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchwolfssl< anyUNKNOWN
ubuntu16.04noarchwolfssl< anyUNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.098 Low

EPSS

Percentile

94.9%