Impact
DecodeObjectId() in wolfSSL performs an incorrect bounds check, writing two Object Identifier components into an output buffer that is only sized for one. A second flaw allows callers to pass the size of the structure instead of the intended element count, enabling an attacker to provide a crafted ASN.1 value with 33 or more arcs that overflows the buffer. The resulting heap write can corrupt adjacent memory, potentially causing crashes or unpredictable behavior; no direct remote code execution path is documented for this flaw.
Affected Systems
The issue resides in the wolfSSL cryptographic library; it applies to any application that links against wolfSSL versions containing the legacy DecodeObjectId implementation within wolfcrypt/src/asn.c. Specific version ranges are not enumerated in the CNA data, so all releases compiled with this code are potentially affected.
Risk and Exploitability
The CVSS score of 2.3 indicates a low severity, and the vulnerability is not listed in CISA’s KEV catalog. The exploit requires a crafted ASN.1 payload that the application processes; if the WC_ASN_UNKNOWN_EXT_CB callback is enabled, the payload could be transmitted over a network, giving a remote attacker a network‑reachable vector. Absent that option, exploitation remains limited to local or application‑level input. Overall risk is low to moderate pending the presence of the callback and the ability to supply the malicious ASN.1 data.
OpenCVE Enrichment