Multiple vulnerabilities in wolfSSL



| Updated: 2024-09-04
Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2024-0901
CVE-2024-1545
CWE-ID CWE-125
CWE-1256
Exploitation vector Network
Public exploit N/A
Vulnerable software
wolfSSL
Universal components / Libraries / Libraries used by multiple products

Vendor wolfSSL

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Out-of-bounds read

EUVDB-ID: #VU93810

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-0901

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition. A remote attacker can send specially crafted packets to the application, trigger an out-of-bounds read error and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

wolfSSL: 5.6.0 - 5.6.6

CPE2.3 External links

http://github.com/wolfSSL/wolfssl/issues/7089
http://github.com/wolfSSL/wolfssl/pull/7099


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper restriction of software interfaces to hardware features

EUVDB-ID: #VU96799

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-1545

CWE-ID: CWE-1256 - Improper restriction of software interfaces to hardware features

Exploit availability: No

Description

The vulnerability allows a remote attacker to decrypt data.

The vulnerability exists due to a fault injection within the RsaPrivateDecryption() function in wolfssl/wolfcrypt/src/rsa.c. A local user can perform perform a Rowhammer fault injection and gain access to sensitive information.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

wolfSSL: 5.0.0 - 5.6.6

CPE2.3 External links

http://github.com/wolfSSL/wolfssl/releases/tag/v5.7.0-stable


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###