In wolfSSL prior to 5.6.6, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS client or network attacker can trigger a buffer over-read on the heap of 5 bytes (WOLFSSL_CALLBACKS is only intended for debugging).
Metrics
Affected Vendors & Products
References
History
Wed, 12 Feb 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wolfssl
Wolfssl wolfssl |
|
Weaknesses | CWE-125 | |
CPEs | cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:* | |
Vendors & Products |
Wolfssl
Wolfssl wolfssl |

Status: PUBLISHED
Assigner: wolfSSL
Published:
Updated: 2024-08-27T14:23:58.075Z
Reserved: 2023-12-18T22:01:24.437Z
Link: CVE-2023-6936

Updated: 2024-08-02T08:42:08.671Z

Status : Analyzed
Published: 2024-02-20T22:15:08.197
Modified: 2025-02-12T17:01:14.790
Link: CVE-2023-6936

No data.