// For flags

CVE-2022-38152

 

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in wolfSSL before 5.5.0. When a TLS 1.3 client connects to a wolfSSL server and SSL_clear is called on its session, the server crashes with a segmentation fault. This occurs in the second session, which is created through TLS session resumption and reuses the initial struct WOLFSSL. If the server reuses the previous session structure (struct WOLFSSL) by calling wolfSSL_clear(WOLFSSL* ssl) on it, the next received Client Hello (that resumes the previous session) crashes the server. Note that this bug is only triggered when resuming sessions using TLS session resumption. Only servers that use wolfSSL_clear instead of the recommended SSL_free; SSL_new sequence are affected. Furthermore, wolfSSL_clear is part of wolfSSL's compatibility layer and is not enabled by default. It is not part of wolfSSL's native API.

Se ha detectado un problema en wolfSSL versiones anteriores a 5.5.0. Cuando un cliente TLS versión 1.3 es conectado a un servidor wolfSSL y es llamado a SSL_clear en su sesión, el servidor es bloqueado con un fallo de segmentación. Esto ocurre en la segunda sesión, que es creada mediante la reanudación de la sesión TLS y reúsa la estructura inicial WOLFSSL. Si el servidor reúsa la estructura de sesión anterior (struct WOLFSSL) llamando a wolfSSL_clear(WOLFSSL* ssl) sobre ella, el siguiente Client Hello recibido (que reanuda la sesión anterior) bloquea el servidor. Tenga en cuenta que este fallo sólo es producido cuando son reanudadas las sesiones usando la reanudación de sesión TLS. Sólo están afectados los servidores que usan wolfSSL_clear en lugar de la secuencia recomendada SSL_free; SSL_new. Además, wolfSSL_clear forma parte de la capa de compatibilidad de wolfSSL y no está habilitada por defecto. No forma parte de la API nativa de wolfSSL

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-08-11 CVE Reserved
  • 2022-08-31 CVE Published
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • 2024-11-22 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-754: Improper Check for Unusual or Exceptional Conditions
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Wolfssl
Search vendor "Wolfssl"
Wolfssl
Search vendor "Wolfssl" for product "Wolfssl"
< 5.5.0
Search vendor "Wolfssl" for product "Wolfssl" and version " < 5.5.0"
-
Affected