Your submission was sent successfully! Close

CVE-2019-16748

Published: 24 September 2019

In wolfSSL through 4.1.0, there is a missing sanity check of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer over-read in CheckCertSignature_ex in wolfcrypt/src/asn.c.

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
wolfssl
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.10 (Impish Indri) Not vulnerable
(4.2.0+dfsg-1)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(4.2.0+dfsg-1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(4.2.0+dfsg-1)
Ubuntu 18.04 LTS (Bionic Beaver) Needs triage

Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needs-triage)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist