Description
In MatrixSSL 3.8.3 Open through 4.2.1 Open, the DTLS server mishandles incoming network messages leading to a heap-based buffer overflow of up to 256 bytes and possible Remote Code Execution in parseSSLHandshake in sslDecode.c. During processing of a crafted packet, the server mishandles the fragment length value provided in the DTLS message.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-5630 | In MatrixSSL 3.8.3 Open through 4.2.1 Open, the DTLS server mishandles incoming network messages leading to a heap-based buffer overflow of up to 256 bytes and possible Remote Code Execution in parseSSLHandshake in sslDecode.c. During processing of a crafted packet, the server mishandles the fragment length value provided in the DTLS message. |
References
| Link | Providers |
|---|---|
| https://github.com/matrixssl/matrixssl/issues/30 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T00:19:41.092Z
Reserved: 2019-07-29T00:00:00.000Z
Link: CVE-2019-14431
No data.
Status : Modified
Published: 2019-07-29T22:15:12.177
Modified: 2024-11-21T04:26:44.163
Link: CVE-2019-14431
No data.
OpenCVE Enrichment
No data.
EUVD