CVE-2019-18840

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2019-18840
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-18840.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-18840
Published
2019-11-09T13:15:10Z
Modified
2024-06-06T12:41:35.416054Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In wolfSSL 4.1.0 through 4.2.0c, there are missing sanity checks of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer overflow inside the DecodedCert structure in GetName in wolfcrypt/src/asn.c because the domain name location index is mishandled. Because a pointer is overwritten, there is an invalid free.

References

Affected packages

Git / github.com/wolfssl/wolfssl

Affected ranges

Type
GIT
Repo
https://github.com/wolfssl/wolfssl
Events

Affected versions

v4.*

v4.1.0-stable
v4.2.0-stable

Other

wolfRand-RC2