WolfSSL 5.6.6

CPE Details

WolfSSL 5.6.6
5.6.6
2025-01-14
19h39 +00:00
2025-01-14
19h39 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:wolfssl:wolfssl:5.6.6:*:*:*:*:*:*:*

Informations

Vendor

wolfssl

Product

wolfssl

Version

5.6.6

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2024-2881 2024-08-29 23h10 +00:00 Fault Injection vulnerability in wc_ed25519_sign_msg function in wolfssl/wolfcrypt/src/ed25519.c in WolfSSL wolfssl5.6.6 on Linux/Windows allows remote attacker co-resides in the same system with a victim process to disclose information and escalate privileges via Rowhammer fault injection to the ed25519_key structure.
8.8
Haute
CVE-2024-1545 2024-08-29 23h02 +00:00 Fault Injection vulnerability in RsaPrivateDecryption function in wolfssl/wolfcrypt/src/rsa.c in WolfSSL wolfssl5.6.6 on Linux/Windows allows remote attacker co-resides in the same system with a victim process to disclose information and escalate privileges via Rowhammer fault injection to the RsaKey structure.
8.8
Haute
CVE-2024-5991 2024-08-27 18h33 +00:00 In function MatchDomainName(), input param str is treated as a NULL terminated string despite being user provided and unchecked. Specifically, the function X509_check_host() takes in a pointer and length to check against, with no requirements that it be NULL terminated. If a caller was attempting to do a name check on a non-NULL terminated buffer, the code would read beyond the bounds of the input array until it found a NULL terminator.This issue affects wolfSSL: through 5.7.0.
10
Critique