// For flags

CVE-2022-38153

 

Severity Score

5.9
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in wolfSSL before 5.5.0 (when --enable-session-ticket is used); however, only version 5.3.0 is exploitable. Man-in-the-middle attackers or a malicious server can crash TLS 1.2 clients during a handshake. If an attacker injects a large ticket (more than 256 bytes) into a NewSessionTicket message in a TLS 1.2 handshake, and the client has a non-empty session cache, the session cache frees a pointer that points to unallocated memory, causing the client to crash with a "free(): invalid pointer" message. NOTE: It is likely that this is also exploitable during TLS 1.3 handshakes between a client and a malicious server. With TLS 1.3, it is not possible to exploit this as a man-in-the-middle.

Se ha detectado un problema en wolfSSL versiones anteriores a 5.5.0 (cuando es usado --enable-session-ticket); sin embargo, sólo la versión 5.3.0 es explotable. Los atacantes de tipo Man-in-the-middle o un servidor malicioso pueden colapsar los clientes TLS versión 1.2 durante un handshake. Si un atacante inyecta un ticket grande (más de 256 bytes) en un mensaje NewSessionTicket en un handshake TLS versión 1.2, y el cliente presenta una caché de sesión no vacía, la caché de sesión libera un puntero que apunta a la memoria no asignada, causando el bloqueo del cliente con un mensaje "free(): invalid pointer". NOTA: Es probable que esto también sea explotable durante los handshakes de TLS versión 1.3 entre un cliente y un servidor malicioso. Con TLS versión 1.3, no es posible explotar esto como un ataque de tipo man-in-the-middle

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-08-11 CVE Reserved
  • 2022-08-31 CVE Published
  • 2024-04-21 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-770: Allocation of Resources Without Limits or Throttling
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Wolfssl
Search vendor "Wolfssl"
Wolfssl
Search vendor "Wolfssl" for product "Wolfssl"
5.3.0
Search vendor "Wolfssl" for product "Wolfssl" and version "5.3.0"
-
Affected