NA

CVE-2022-34293

Published: 08/08/2022 Updated: 12/08/2022
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

wolfSSL prior to 5.4.0 allows remote malicious users to cause a denial of service via DTLS because a check for return-routability can be skipped.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wolfssl wolfssl

Vendor Advisories

Debian Bug report logs - #1016981 wolfssl: CVE-2022-34293 Package: src:wolfssl; Maintainer for src:wolfssl is Felix Lechner <felixlechner@lease-upcom>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Wed, 10 Aug 2022 20:15:16 UTC Severity: important Tags: security, upstream Reply or subscribe to this b ...

Github Repositories

fork of wolfssl that enables the use of expanded ed25519 keys for use with Tor

wolfSSL Embedded SSL/TLS Library The wolfSSL embedded SSL library (formerly CyaSSL) is a lightweight SSL/TLS library written in ANSI C and targeted for embedded, RTOS, and resource-constrained environments - primarily because of its small size, speed, and feature set It is commonly used in standard operating environments as well because of its royalty-free pricing and excelle