Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-39173
HistorySep 29, 2022 - 12:00 a.m.

CVE-2022-39173

2022-09-2900:00:00
ubuntu.com
ubuntu.com
10
wolfssl buffer overflow
tls handshake
cve-2022-39173
malicious clients
hello retry request

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.004 Low

EPSS

Percentile

74.3%

In wolfSSL before 5.5.1, malicious clients can cause a buffer overflow
during a TLS 1.3 handshake. This occurs when an attacker supposedly resumes
a previous TLS session. During the resumption Client Hello a Hello Retry
Request must be triggered. Both Client Hellos are required to contain a
list of duplicate cipher suites to trigger the buffer overflow. In total,
two Client Hellos have to be sent: one in the resumed session, and a second
one as a response to a Hello Retry Request message.

Notes

Author Note
ccdm94 MariaDB 10.6 package includes wolfSSL code under directory ‘extra’, however, Ubuntu builds MariaDB 10.6 with OpenSSL instead.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.004 Low

EPSS

Percentile

74.3%