CVE-2023-6936

In wolfSSL prior to 5.6.6, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS client or network attacker can trigger a buffer over-read on the heap of 5 bytes (WOLFSSL_CALLBACKS is only intended for debugging).
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*

History

26 Mar 2025, 17:15

Type Values Removed Values Added
CWE CWE-126

12 Feb 2025, 17:01

Type Values Removed Values Added
References () https://github.com/wolfSSL/wolfssl/pull/6949/ - () https://github.com/wolfSSL/wolfssl/pull/6949/ - Issue Tracking, Patch
References () https://www.wolfssl.com/docs/security-vulnerabilities/ - () https://www.wolfssl.com/docs/security-vulnerabilities/ - Vendor Advisory
CPE cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
CWE CWE-125
First Time Wolfssl
Wolfssl wolfssl

21 Nov 2024, 08:44

Type Values Removed Values Added
References () https://github.com/wolfSSL/wolfssl/pull/6949/ - () https://github.com/wolfSSL/wolfssl/pull/6949/ -
References () https://www.wolfssl.com/docs/security-vulnerabilities/ - () https://www.wolfssl.com/docs/security-vulnerabilities/ -

22 Feb 2024, 19:07

Type Values Removed Values Added
Summary
  • (es) En wolfSSL anterior a 5.6.6, si las funciones de devolución de llamada están habilitadas (a través del indicador WOLFSSL_CALLBACKS), entonces un cliente TLS malicioso o un atacante de red puede desencadenar una sobrelectura del búfer en el montón de 5 bytes (WOLFSSL_CALLBACKS solo está destinado a la depuración).

20 Feb 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-20 22:15

Updated : 2025-03-26 17:15


NVD link : CVE-2023-6936

Mitre link : CVE-2023-6936

CVE.ORG link : CVE-2023-6936


JSON object : View

Products Affected

wolfssl

  • wolfssl
CWE
CWE-125

Out-of-bounds Read

CWE-126

Buffer Over-read