In function MatchDomainName(), input param str is treated as a NULL terminated string despite being user provided and unchecked. Specifically, the function X509_check_host() takes in a pointer and length to check against, with no requirements that it be NULL terminated. If a caller was attempting to do a name check on a non-NULL terminated buffer, the code would read beyond the bounds of the input array until it found a NULL terminator.This issue affects wolfSSL: through 5.7.0.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Sep 2024 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
cvssV3_1
|
Tue, 27 Aug 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wolfssl
Wolfssl wolfssl |
|
| CPEs | cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Wolfssl
Wolfssl wolfssl |
|
| Metrics |
ssvc
|
Tue, 27 Aug 2024 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In function MatchDomainName(), input param str is treated as a NULL terminated string despite being user provided and unchecked. Specifically, the function X509_check_host() takes in a pointer and length to check against, with no requirements that it be NULL terminated. If a caller was attempting to do a name check on a non-NULL terminated buffer, the code would read beyond the bounds of the input array until it found a NULL terminator.This issue affects wolfSSL: through 5.7.0. | |
| Title | Buffer overread in domain name matching | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: wolfSSL
Published: 2024-08-27T18:33:27.550Z
Updated: 2024-08-27T20:06:24.558Z
Reserved: 2024-06-13T21:54:51.320Z
Link: CVE-2024-5991
Updated: 2024-08-27T20:06:11.315Z
Status : Analyzed
Published: 2024-08-27T19:15:18.080
Modified: 2024-09-06T22:51:41.470
Link: CVE-2024-5991
No data.
ReportizFlow