Show filters
71 Total Results
Displaying 41-50 of 71
Sort by:
Attacker Value
Unknown
CVE-2020-11713
Disclosure Date: April 12, 2020 (last updated February 21, 2025)
wolfSSL 4.3.0 has mulmod code in wc_ecc_mulmod_ex in ecc.c that does not properly resist timing side-channel attacks.
0
Attacker Value
Unknown
CVE-2014-2897
Disclosure Date: January 28, 2020 (last updated February 21, 2025)
The SSL 3 HMAC functionality in wolfSSL CyaSSL 2.5.0 before 2.9.4 does not check the padding length when verification fails, which allows remote attackers to have unspecified impact via a crafted HMAC, which triggers an out-of-bounds read.
0
Attacker Value
Unknown
CVE-2014-2896
Disclosure Date: January 28, 2020 (last updated February 21, 2025)
The DoAlert function in the (1) TLS and (2) DTLS implementations in wolfSSL CyaSSL before 2.9.4 allows remote attackers to have unspecified impact and vectors, which trigger memory corruption or an out-of-bounds read.
0
Attacker Value
Unknown
CVE-2014-2898
Disclosure Date: January 28, 2020 (last updated February 21, 2025)
wolfSSL CyaSSL before 2.9.4 allows remote attackers to have unspecified impact via multiple calls to the CyaSSL_read function which triggers an out-of-bounds read when an error occurs, related to not checking the return code and MAC verification failure.
0
Attacker Value
Unknown
CVE-2019-19960
Disclosure Date: December 25, 2019 (last updated November 27, 2024)
In wolfSSL before 4.3.0, wc_ecc_mulmod_ex does not properly resist side-channel attacks.
0
Attacker Value
Unknown
CVE-2019-19962
Disclosure Date: December 25, 2019 (last updated November 27, 2024)
wolfSSL before 4.3.0 mishandles calls to wc_SignatureGenerateHash, leading to fault injection in RSA cryptography.
0
Attacker Value
Unknown
CVE-2019-19963
Disclosure Date: December 25, 2019 (last updated November 27, 2024)
An issue was discovered in wolfSSL before 4.3.0 in a non-default configuration where DSA is enabled. DSA signing uses the BEEA algorithm during modular inversion of the nonce, leading to a side-channel attack against the nonce.
0
Attacker Value
Unknown
CVE-2019-14317
Disclosure Date: December 11, 2019 (last updated November 27, 2024)
wolfSSL and wolfCrypt 4.1.0 and earlier (formerly known as CyaSSL) generate biased DSA nonces. This allows a remote attacker to compute the long term private key from several hundred DSA signatures via a lattice attack. The issue occurs because dsa.c fixes two bits of the generated nonces.
0
Attacker Value
Unknown
CVE-2014-2901
Disclosure Date: November 21, 2019 (last updated November 27, 2024)
wolfssl before 3.2.0 does not properly issue certificates for a server's hostname.
0
Attacker Value
Unknown
CVE-2014-2902
Disclosure Date: November 21, 2019 (last updated November 27, 2024)
wolfssl before 3.2.0 does not properly authorize CA certificate for signing other certificates.
0