wolfssl: CVE-2019-11873

Related Vulnerabilities: CVE-2019-11873  

Debian Bug report logs - #929468
wolfssl: CVE-2019-11873

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Fri, 24 May 2019 07:30:02 UTC

Severity: grave

Tags: security, upstream

Found in version wolfssl/3.15.3+dfsg-2

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, team@security.debian.org, Felix Lechner <felix.lechner@lease-up.com>:
Bug#929468; Package src:wolfssl. (Fri, 24 May 2019 07:30:05 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, team@security.debian.org, Felix Lechner <felix.lechner@lease-up.com>. (Fri, 24 May 2019 07:30:05 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: wolfssl: CVE-2019-11873
Date: Fri, 24 May 2019 09:25:05 +0200
Source: wolfssl
Version: 3.15.3+dfsg-2
Severity: grave
Tags: security upstream

Hi,

The following vulnerability was published for wolfssl.

CVE-2019-11873[0]:
| wolfSSL 4.0.0 has a Buffer Overflow in DoPreSharedKeys in tls13.c when
| a current identity size is greater than a client identity size. An
| attacker sends a crafted hello client packet over the network to a
| TLSv1.3 wolfSSL server. The length fields of the packet: record
| length, client hello length, total extensions length, PSK extension
| length, total identity length, and identity length contain their
| maximum value which is 2^16. The identity data field of the PSK
| extension of the packet contains the attack data, to be stored in the
| undefined memory (RAM) of the server. The size of the data is about 65
| kB. Possibly the attacker can perform a remote code execution attack.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-11873
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11873

Please adjust the affected versions in the BTS as needed, could you
double check 3.15.3 is affected.

Regards,
Salvatore



Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 14:54:12 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.