CVE-2019-18840

In wolfSSL 4.1.0 through 4.2.0c, there are missing sanity checks of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer overflow inside the DecodedCert structure in GetName in wolfcrypt/src/asn.c because the domain name location index is mishandled. Because a pointer is overwritten, there is an invalid free.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
mitreCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AC:L/AV:N/A:H/C:N/I:N/PR:N/S:U/UI:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 60%
VendorProductVersion
wolfsslwolfssl
4.1.0 ≤
𝑥
≤ 4.2.0c
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
wolfssl
bullseye
4.6.0+p1-0+deb11u2
fixed
bookworm
5.5.4-2+deb12u1
fixed
sid
5.7.2-0.1
fixed
trixie
5.7.2-0.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
wolfssl
focal
Fixed 4.2.0+dfsg-3
released
eoan
ignored
disco
not-affected
bionic
not-affected
xenial
not-affected
trusty
dne