ALT-PU-2025-9488-2
Closed vulnerabilities
BDU:2024-07076
Уязвимость конфигурации WOLFSSL_CHECK_SIG_FAULTS библиотеки SSL/TLS WolfSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2024-07276
Уязвимость функции MatchDomainName() библиотеки SSL/TLS WolfSSL, позволяющая нарушителю оказать влияние на доступность защищаемой информации
Modified: 2025-02-27
CVE-2024-5288
An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys, such as in server-side TLS connections, the connection is halted if any fault occurs. The success rate in a certain amount of connection requests can be processed via an advanced technique for ECDSA key recovery.
Modified: 2024-09-06
CVE-2024-5991
In function MatchDomainName(), input param str is treated as a NULL terminated string despite being user provided and unchecked. Specifically, the function X509_check_host() takes in a pointer and length to check against, with no requirements that it be NULL terminated. If a caller was attempting to do a name check on a non-NULL terminated buffer, the code would read beyond the bounds of the input array until it found a NULL terminator.This issue affects wolfSSL: through 5.7.0.