CVE-2024-48075

A Heap buffer overflow in the server-site handshake implementation in Real Time Logic SharkSSL 09.09.24 and earlier allows a remote attacker to trigger a Denial-of-Service via a malformed TLS Client Key Exchange message.
Configurations

No configuration.

History

18 Nov 2024, 19:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
CWE CWE-120

13 Nov 2024, 17:01

Type Values Removed Values Added
Summary
  • (es) Un desbordamiento de búfer de montón en la implementación del protocolo de enlace del servidor-sitio en Real Time Logic SharkSSL 09.09.24 y versiones anteriores permite que un atacante remoto active una denegación de servicio a través de un mensaje de intercambio de clave de cliente TLS mal formado.

12 Nov 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-12 22:15

Updated : 2024-11-18 19:35


NVD link : CVE-2024-48075

Mitre link : CVE-2024-48075

CVE.ORG link : CVE-2024-48075


JSON object : View

Products Affected

No product.

CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')