Show filters
71 Total Results
Displaying 41-50 of 71
Sort by:
Attacker Value
Unknown

CVE-2020-11713

Disclosure Date: April 12, 2020 (last updated February 21, 2025)
wolfSSL 4.3.0 has mulmod code in wc_ecc_mulmod_ex in ecc.c that does not properly resist timing side-channel attacks.
Attacker Value
Unknown

CVE-2014-2897

Disclosure Date: January 28, 2020 (last updated February 21, 2025)
The SSL 3 HMAC functionality in wolfSSL CyaSSL 2.5.0 before 2.9.4 does not check the padding length when verification fails, which allows remote attackers to have unspecified impact via a crafted HMAC, which triggers an out-of-bounds read.
Attacker Value
Unknown

CVE-2014-2896

Disclosure Date: January 28, 2020 (last updated February 21, 2025)
The DoAlert function in the (1) TLS and (2) DTLS implementations in wolfSSL CyaSSL before 2.9.4 allows remote attackers to have unspecified impact and vectors, which trigger memory corruption or an out-of-bounds read.
Attacker Value
Unknown

CVE-2014-2898

Disclosure Date: January 28, 2020 (last updated February 21, 2025)
wolfSSL CyaSSL before 2.9.4 allows remote attackers to have unspecified impact via multiple calls to the CyaSSL_read function which triggers an out-of-bounds read when an error occurs, related to not checking the return code and MAC verification failure.
Attacker Value
Unknown

CVE-2019-19960

Disclosure Date: December 25, 2019 (last updated November 27, 2024)
In wolfSSL before 4.3.0, wc_ecc_mulmod_ex does not properly resist side-channel attacks.
Attacker Value
Unknown

CVE-2019-19962

Disclosure Date: December 25, 2019 (last updated November 27, 2024)
wolfSSL before 4.3.0 mishandles calls to wc_SignatureGenerateHash, leading to fault injection in RSA cryptography.
Attacker Value
Unknown

CVE-2019-19963

Disclosure Date: December 25, 2019 (last updated November 27, 2024)
An issue was discovered in wolfSSL before 4.3.0 in a non-default configuration where DSA is enabled. DSA signing uses the BEEA algorithm during modular inversion of the nonce, leading to a side-channel attack against the nonce.
Attacker Value
Unknown

CVE-2019-14317

Disclosure Date: December 11, 2019 (last updated November 27, 2024)
wolfSSL and wolfCrypt 4.1.0 and earlier (formerly known as CyaSSL) generate biased DSA nonces. This allows a remote attacker to compute the long term private key from several hundred DSA signatures via a lattice attack. The issue occurs because dsa.c fixes two bits of the generated nonces.
Attacker Value
Unknown

CVE-2014-2901

Disclosure Date: November 21, 2019 (last updated November 27, 2024)
wolfssl before 3.2.0 does not properly issue certificates for a server's hostname.
Attacker Value
Unknown

CVE-2014-2902

Disclosure Date: November 21, 2019 (last updated November 27, 2024)
wolfssl before 3.2.0 does not properly authorize CA certificate for signing other certificates.