In wolfSSL 4.1.0 through 4.2.0c, there are missing sanity checks of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer overflow inside the DecodedCert structure in GetName in wolfcrypt/src/asn.c because the domain name location index is mishandled. Because a pointer is overwritten, there is an invalid free.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/wolfSSL/wolfssl/issues/2555 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2019-11-09T12:58:52
Updated: 2024-08-05T02:02:39.610Z
Reserved: 2019-11-09T00:00:00
Link: CVE-2019-18840
Vulnrichment
No data.
NVD
Status : Modified
Published: 2019-11-09T13:15:10.227
Modified: 2024-11-21T04:33:41.387
Link: CVE-2019-18840
Redhat
No data.