Remotely executed SEGV and out of bounds read allows malicious packet sender to crash or cause an out of bounds read via sending a malformed packet with the correct length.
References
| Link | Resource |
|---|---|
| https://github.com/wolfSSL/wolfssl/issues/7089 | Exploit Issue Tracking |
| https://github.com/wolfSSL/wolfssl/pull/7099 | Issue Tracking Patch |
| https://github.com/wolfSSL/wolfssl/issues/7089 | Exploit Issue Tracking |
| https://github.com/wolfSSL/wolfssl/pull/7099 | Issue Tracking Patch |
Configurations
History
No history.
Information
Published : 2024-03-25 23:15
Updated : 2025-12-15 21:42
NVD link : CVE-2024-0901
Mitre link : CVE-2024-0901
CVE.ORG link : CVE-2024-0901
JSON object : View
Products Affected
wolfssl
- wolfssl
CWE
CWE-129
Improper Validation of Array Index
