Impact
An integer overflow in the static function wolfssl_add_to_chain causes heap corruption when certificate data is written beyond the bounds of an insufficiently sized buffer. This flaw occurs during certificate chain processing and can lead to application crashes or unpredictable behavior. The vulnerability is confined to the certificate loading context and is not remotely exploitable.
Affected Systems
The flaw affects the wolfSSL library, particularly when the APIs wolfSSL_CTX_add_extra_chain_cert, wolfSSL_CTX_add1_chain_cert, and wolfSSL_add0_chain_cert are used. These APIs are enabled for third‑party compatibility with OpenSSL, LibreSSL, Lighty, stunnel, nginx, and haproxy. No specific version ranges are provided.
Risk and Exploitability
CVSS is 1.2, reflecting low impact and limited exploitation. EPSS is under 1%, and the issue is not listed in the CISA KEV catalog. Since the flaw is local and requires control over the certificate loading process, it is unlikely to be leveraged in a remote attack. Nonetheless, if an attacker has local code execution privileges they could use the overflow to corrupt memory and potentially alter program behavior.
OpenCVE Enrichment