CVE-2024-48075

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-48075
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-48075.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-48075
Published
2024-11-12T22:15:15Z
Modified
2024-11-21T21:15:22Z
Summary
[none]
Details

A Heap buffer overflow in the server-site handshake implementation in Real Time Logic SharkSSL from 09/09/24 and earlier allows a remote attacker to trigger a Denial-of-Service via a malformed TLS Client Key Exchange message.

References

Affected packages

Git / github.com/realtimelogic/sharkssl

Affected ranges

Type
GIT
Repo
https://github.com/realtimelogic/sharkssl
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed