Lucene search

K
vulnrichmentWolfSSLVULNRICHMENT:CVE-2024-5991
HistoryAug 27, 2024 - 6:33 p.m.

CVE-2024-5991 Buffer overread in domain name matching

2024-08-2718:33:27
CWE-125
wolfSSL
github.com
3
cve-2024-5991
buffer overread
domain name matching
wolfssl
security issue
input validation

CVSS4

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H

AI Score

6.6

Confidence

High

EPSS

0.001

Percentile

17.7%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

total

In function MatchDomainName(), input param str is treated as a NULL terminated string despite being user provided and unchecked. Specifically, the function X509_check_host() takes in a pointer and length to check against, with no requirements that it be NULL terminated. If a caller was attempting to do a name check on a non-NULL terminated buffer, the code would read beyond the bounds of the input array until it found a NULL terminator.This issue affects wolfSSL: through 5.7.0.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*"
    ],
    "vendor": "wolfssl",
    "product": "wolfssl",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "5.7.0"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS4

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H

AI Score

6.6

Confidence

High

EPSS

0.001

Percentile

17.7%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

total