In wolfSSL prior to 5.6.6, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS client or network attacker can trigger a buffer over-read on the heap of 5 bytes (WOLFSSL_CALLBACKS is only intended for debugging).
History

Wed, 12 Feb 2025 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Wolfssl
Wolfssl wolfssl
Weaknesses CWE-125
CPEs cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
Vendors & Products Wolfssl
Wolfssl wolfssl

cve-icon MITRE

Status: PUBLISHED

Assigner: wolfSSL

Published:

Updated: 2024-08-27T14:23:58.075Z

Reserved: 2023-12-18T22:01:24.437Z

Link: CVE-2023-6936

cve-icon Vulnrichment

Updated: 2024-08-02T08:42:08.671Z

cve-icon NVD

Status : Analyzed

Published: 2024-02-20T22:15:08.197

Modified: 2025-02-12T17:01:14.790

Link: CVE-2023-6936

cve-icon Redhat

No data.