Lucene search

K
cveMitreCVE-2022-38153
HistoryAug 31, 2022 - 6:15 p.m.

CVE-2022-38153

2022-08-3118:15:08
CWE-770
mitre
web.nvd.nist.gov
42
4
cve-2022-38153
wolfssl
tls 1.2
handshake
security vulnerability
exploit
nvd

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

5.6

Confidence

High

EPSS

0.003

Percentile

71.4%

An issue was discovered in wolfSSL before 5.5.0 (when --enable-session-ticket is used); however, only version 5.3.0 is exploitable. Man-in-the-middle attackers or a malicious server can crash TLS 1.2 clients during a handshake. If an attacker injects a large ticket (more than 256 bytes) into a NewSessionTicket message in a TLS 1.2 handshake, and the client has a non-empty session cache, the session cache frees a pointer that points to unallocated memory, causing the client to crash with a “free(): invalid pointer” message. NOTE: It is likely that this is also exploitable during TLS 1.3 handshakes between a client and a malicious server. With TLS 1.3, it is not possible to exploit this as a man-in-the-middle.

Affected configurations

Nvd
Node
wolfsslwolfsslMatch5.3.0
VendorProductVersionCPE
wolfsslwolfssl5.3.0cpe:2.3:a:wolfssl:wolfssl:5.3.0:*:*:*:*:*:*:*

Social References

More

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

5.6

Confidence

High

EPSS

0.003

Percentile

71.4%