Page 6 of 59 results (0.007 seconds)

CVSS: 7.0EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered in wolfSSL before 4.5.0, when single precision is not employed. Local attackers can conduct a cache-timing attack against public key operations. These attackers may already have obtained sensitive information if the affected system has been used for private key operations (e.g., signing with a private key). Se detectó un problema en wolfSSL versiones anteriores a 4.5.0, cuando no se emplea precisión simple. Unos atacantes locales pueden conducir un ataque de sincronización de caché contra operaciones de clave pública. • https://arxiv.org/abs/2008.12188 https://github.com/wolfSSL/wolfssl/releases/tag/v4.5.0-stable • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in wolfSSL before 4.5.0. It mishandles the change_cipher_spec (CCS) message processing logic for TLS 1.3. If an attacker sends ChangeCipherSpec messages in a crafted way involving more than one in a row, the server becomes stuck in the ProcessReply() loop, i.e., a denial of service. Se detectó un problema en wolfSSL versiones anteriores a 4.5.0. Maneja inapropiadamente la lógica de procesamiento de mensajes de change_cipher_spec (CCS) para TLS versión 1.3. • https://github.com/wolfSSL/wolfssl/pull/2927 https://github.com/wolfSSL/wolfssl/releases/tag/v4.5.0-stable • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in the DTLS handshake implementation in wolfSSL before 4.5.0. Clear DTLS application_data messages in epoch 0 do not produce an out-of-order error. Instead, these messages are returned to the application. Se detectó un problema en la implementación del protocolo de enlace DTLS en wolfSSL versiones anteriores a 4.5.0. Borrar los mensajes application_data de DTLS en epoch 0 no producen un error fuera de orden. • https://github.com/wolfSSL/wolfssl/pull/3219 https://github.com/wolfSSL/wolfssl/releases/tag/v4.5.0-stable •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

The private-key operations in ecc.c in wolfSSL before 4.4.0 do not use a constant-time modular inverse when mapping to affine coordinates, aka a "projective coordinates leak." Las operaciones de clave privada en el archivo ecc.c en wolfSSL versiones anteriores a 4.4.0, no usan un inverso modular de tiempo constante cuando mapean a unas coordenadas afines, también se conoce como "projective coordinates leak" • https://github.com/wolfSSL/wolfssl/commit/1de07da61f0c8e9926dcbd68119f73230dae283f https://github.com/wolfSSL/wolfssl/releases/tag/v4.4.0-stable • CWE-203: Observable Discrepancy •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

wolfSSL 4.3.0 has mulmod code in wc_ecc_mulmod_ex in ecc.c that does not properly resist timing side-channel attacks. wolfSSL versión 4.3.0, presenta código mulmod en la función wc_ecc_mulmod_ex en el archivo ecc.c que no resiste apropiadamente los ataques de sincronización de canal lateral. • https://gist.github.com/pietroborrello/7c5be2d1dc15349c4ffc8671f0aad04f https://github.com/wolfSSL/wolfssl/pull/2894 • CWE-203: Observable Discrepancy •