Show filters
71 Total Results
Displaying 61-70 of 71
Sort by:
Attacker Value
Unknown

CVE-2014-2903

Disclosure Date: October 06, 2017 (last updated November 26, 2024)
CyaSSL does not check the key usage extension in leaf certificates, which allows remote attackers to spoof servers via a crafted server certificate not authorized for use in an SSL/TLS handshake.
0
Attacker Value
Unknown

CVE-2017-2800

Disclosure Date: May 24, 2017 (last updated November 26, 2024)
A specially crafted x509 certificate can cause a single out of bounds byte overwrite in wolfSSL through 3.10.2 resulting in potential certificate validation vulnerabilities, denial of service and possible remote code execution. In order to trigger this vulnerability, the attacker needs to supply a malicious x509 certificate to either a server or a client application using this library.
Attacker Value
Unknown

CVE-2017-8854

Disclosure Date: May 09, 2017 (last updated November 26, 2024)
wolfSSL before 3.10.2 has an out-of-bounds memory access with loading crafted DH parameters, aka a buffer overflow triggered by a malformed temporary DH file.
0
Attacker Value
Unknown

CVE-2017-8855

Disclosure Date: May 09, 2017 (last updated November 26, 2024)
wolfSSL before 3.11.0 does not prevent wc_DhAgree from accepting a malformed DH key.
0
Attacker Value
Unknown

CVE-2017-6076

Disclosure Date: February 24, 2017 (last updated November 26, 2024)
In versions of wolfSSL before 3.10.2 the function fp_mul_comba makes it easier to extract RSA key information for a malicious user who has access to view cache on a machine.
0
Attacker Value
Unknown

CVE-2016-7440

Disclosure Date: December 13, 2016 (last updated November 25, 2024)
The C software implementation of AES Encryption and Decryption in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover AES keys by leveraging cache-bank timing differences.
Attacker Value
Unknown

CVE-2016-7438

Disclosure Date: December 13, 2016 (last updated November 25, 2024)
The C software implementation of ECC in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover RSA keys by leveraging cache-bank hit differences.
0
Attacker Value
Unknown

CVE-2016-7439

Disclosure Date: December 13, 2016 (last updated November 25, 2024)
The C software implementation of RSA in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover RSA keys by leveraging cache-bank hit differences.
0
Attacker Value
Unknown

CVE-2015-6925

Disclosure Date: January 22, 2016 (last updated November 25, 2024)
wolfSSL (formerly CyaSSL) before 3.6.8 allows remote attackers to cause a denial of service (resource consumption or traffic amplification) via a crafted DTLS cookie in a ClientHello message.
0
Attacker Value
Unknown

CVE-2015-7744

Disclosure Date: January 22, 2016 (last updated November 25, 2024)
wolfSSL (formerly CyaSSL) before 3.6.8 does not properly handle faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.