Debian Bug report logs -
#929468
wolfssl: CVE-2019-11873
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, team@security.debian.org, Felix Lechner <felix.lechner@lease-up.com>
:
Bug#929468
; Package src:wolfssl
.
(Fri, 24 May 2019 07:30:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, team@security.debian.org, Felix Lechner <felix.lechner@lease-up.com>
.
(Fri, 24 May 2019 07:30:05 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Source: wolfssl
Version: 3.15.3+dfsg-2
Severity: grave
Tags: security upstream
Hi,
The following vulnerability was published for wolfssl.
CVE-2019-11873[0]:
| wolfSSL 4.0.0 has a Buffer Overflow in DoPreSharedKeys in tls13.c when
| a current identity size is greater than a client identity size. An
| attacker sends a crafted hello client packet over the network to a
| TLSv1.3 wolfSSL server. The length fields of the packet: record
| length, client hello length, total extensions length, PSK extension
| length, total identity length, and identity length contain their
| maximum value which is 2^16. The identity data field of the PSK
| extension of the packet contains the attack data, to be stored in the
| undefined memory (RAM) of the server. The size of the data is about 65
| kB. Possibly the attacker can perform a remote code execution attack.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2019-11873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11873
Please adjust the affected versions in the BTS as needed, could you
double check 3.15.3 is affected.
Regards,
Salvatore
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Wed Jun 19 14:54:12 2019;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.