7.5
CVSSv2

CVE-2017-2800

Published: 24/05/2017 Updated: 28/01/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

A specially crafted x509 certificate can cause a single out of bounds byte overwrite in wolfSSL up to and including 3.10.2 resulting in potential certificate validation vulnerabilities, denial of service and possible remote code execution. In order to trigger this vulnerability, the attacker needs to supply a malicious x509 certificate to either a server or a client application using this library.

Vulnerable Product Search on Vulmon Subscribe to Product

wolfssl wolfssl

Vendor Advisories

Debian Bug report logs - #870170 wolfssl: CVE-2017-8855 Package: src:wolfssl; Maintainer for src:wolfssl is Felix Lechner <felixlechner@lease-upcom>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 30 Jul 2017 18:12:02 UTC Severity: grave Tags: fixed-upstream, security, upstream Found in version w ...
Debian Bug report logs - #862154 wolfssl: CVE-2017-2800 / TALOS-2017-0293 Package: src:wolfssl; Maintainer for src:wolfssl is Felix Lechner <felixlechner@lease-upcom>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 9 May 2017 06:51:01 UTC Severity: grave Tags: security, upstream Found in version ...

Exploits

TALOS-2017-0293 WOLFSSL LIBRARY X509 CERTIFICATE TEXT PARSING CODE EXECUTION VULNERABILITY MAY 8, 2017 CVE-2017-2800 SUMMARY An exploitable off-by-one write vulnerability exists in the x509 certificate parsing functionality of wolfSSL library versions up to 3102 A specially crafted x509 certificate can cause a single out of bounds byte overwrit ...