Page 5 of 70 results (0.007 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

24 Dec 2019 — In wolfSSL before 4.3.0, wc_ecc_mulmod_ex does not properly resist side-channel attacks. En wolfSSL versiones anteriores a 4.3.0, la función wc_ecc_mulmod_ex no resiste apropiadamente a los ataques de canal lateral. • https://github.com/wolfSSL/wolfssl/commit/5ee9f9c7a23f8ed093fe1e42bc540727e96cebb8 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

24 Dec 2019 — wolfSSL before 4.3.0 mishandles calls to wc_SignatureGenerateHash, leading to fault injection in RSA cryptography. wolfSSL versiones anteriores a 4.3.0 maneja inapropiadamente las llamadas a la función wc_SignatureGenerateHash, conllevando a la inyección de fallos en la criptografía RSA. • https://github.com/wolfSSL/wolfssl/commit/23878512c65834d12811b1107d19a001478eca5d • CWE-347: Improper Verification of Cryptographic Signature •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

24 Dec 2019 — An issue was discovered in wolfSSL before 4.3.0 in a non-default configuration where DSA is enabled. DSA signing uses the BEEA algorithm during modular inversion of the nonce, leading to a side-channel attack against the nonce. Se detectó un problema en wolfSSL versiones anteriores a 4.3.0, en una configuración no predeterminada donde DSA está habilitado. La firma DSA utiliza el algoritmo BEEA durante la inversión modular del nonce, conllevando a un ataque de canal lateral contra el nonce. • https://github.com/wolfSSL/wolfssl/commit/7e391f0fd57f2ef375b1174d752a56ce34b2b190 •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

11 Dec 2019 — wolfSSL and wolfCrypt 4.1.0 and earlier (formerly known as CyaSSL) generate biased DSA nonces. This allows a remote attacker to compute the long term private key from several hundred DSA signatures via a lattice attack. The issue occurs because dsa.c fixes two bits of the generated nonces. wolfSSL and wolfCrypt versión 4.1.0 y anteriores (anteriormente conocido como CyaSSL), generan nonces DSA sesgados. Esto permite a un atacante remoto calcular la clave privada a largo plazo de varios cientos de firmas DSA... • https://www.wolfssl.com/docs/security-vulnerabilities • CWE-331: Insufficient Entropy •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

21 Nov 2019 — wolfssl before 3.2.0 has a server certificate that is not properly authorized for server authentication. wolfssl versiones anteriores a 3.2.0, presenta un certificado de servidor que no está autorizado apropiadamente por la autenticación del servidor. • http://www.openwall.com/lists/oss-security/2014/04/18/2 • CWE-287: Improper Authentication •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

21 Nov 2019 — wolfssl before 3.2.0 does not properly authorize CA certificate for signing other certificates. wolfssl versiones anteriores a 3.2.0, no autoriza correctamente el certificado CA para firmar otros certificados. • http://www.openwall.com/lists/oss-security/2014/04/18/2 • CWE-295: Improper Certificate Validation •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

21 Nov 2019 — wolfssl before 3.2.0 does not properly issue certificates for a server's hostname. wolfssl versiones anteriores a 3.2.0, no emite apropiadamente certificados para un nombre de host del servidor. • http://www.openwall.com/lists/oss-security/2014/04/18/2 • CWE-295: Improper Certificate Validation •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

09 Nov 2019 — In wolfSSL 4.1.0 through 4.2.0c, there are missing sanity checks of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer overflow inside the DecodedCert structure in GetName in wolfcrypt/src/asn.c because the domain name location index is mishandled. Because a pointer is overwritten, there is an invalid free. En wolfSSL versiones 4.1.0 hasta 4.2.0c, faltan comprobaciones de saneamiento de los accesos a la memoria en el análisis de los datos... • https://github.com/wolfSSL/wolfssl/issues/2555 • CWE-787: Out-of-bounds Write •

CVSS: 4.7EPSS: 0%CPEs: 1EXPL: 0

03 Oct 2019 — wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length. wolfSSL y wolfCrypt versión 4.0.0 y anteriores ... • http://www.openwall.com/lists/oss-security/2019/10/02/2 • CWE-203: Observable Discrepancy •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

24 Sep 2019 — In wolfSSL through 4.1.0, there is a missing sanity check of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer over-read in CheckCertSignature_ex in wolfcrypt/src/asn.c. En wolfSSL versiones hasta 4.1.0, se presenta una falta de comprobación de saneamiento de los accesos a la memoria en el análisis de los datos del certificado ASN.1 durante el protocolo de negociación (handshaking). Específicamente, se presenta una lectura excesiva de bú... • https://github.com/wolfSSL/wolfssl/issues/2459 • CWE-125: Out-of-bounds Read •