wolfSSL.wolfssl is vulnerable to Heap-based Buffer Overflow
83
High Risk
Heap buffer overflow in DTLS 1.3 ACK message processing. A remote attacker can send a crafted DTLS 1.3 ACK message that triggers a heap buffer overflow.
You are affected if you are using a version that falls within the vulnerable range.
wolfSSL.wolfssl is vulnerable to Heap-based Buffer Overflow in versions 0.0.1 - 5.9.0.
Upgrade the wolfSSL.wolfssl library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant