In wolfSSL prior to 5.6.6, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS client or network attacker can trigger a buffer over-read on the heap of 5 bytes (WOLFSSL_CALLBACKS is only intended for debugging).
History

Wed, 26 Mar 2025 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-126
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 12 Feb 2025 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Wolfssl
Wolfssl wolfssl
Weaknesses CWE-125
CPEs cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
Vendors & Products Wolfssl
Wolfssl wolfssl

cve-icon MITRE

Status: PUBLISHED

Assigner: wolfSSL

Published: 2024-02-20T21:52:02.441Z

Updated: 2025-03-26T16:28:30.322Z

Reserved: 2023-12-18T22:01:24.437Z

Link: CVE-2023-6936

cve-icon Vulnrichment

Updated: 2024-08-02T08:42:08.671Z

cve-icon NVD

Status : Modified

Published: 2024-02-20T22:15:08.197

Modified: 2025-03-26T17:15:23.757

Link: CVE-2023-6936

cve-icon Redhat

No data.