SB2021020218 - Denial of service in wolfSSL



SB2021020218 - Denial of service in wolfSSL

Published: February 2, 2021 Updated: February 16, 2021

Security Bulletin ID SB2021020218
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Resource management error (CVE-ID: CVE-2021-3336)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to the DoTls13CertificateVerify() function in tls13.c in wolfSSL continues to process requests after certain anomalous peer behavior, such as sending an ED22519, ED448, ECC, or RSA signature without the corresponding certificate. A remote attacker can abuse this behavior to consume additional system resources and cause denial of service conditions.


2) Input validation error (CVE-ID: N/A)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when processing a crafted compressed ECC key with enabled custom ECC curves. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.


3) Memory leak (CVE-ID: N/A)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due memory leak with TLS 1.3 authenticated-only ciphers when TLS 1.3 early data is enabled. A section of the server hello could contains 16 bytes of uninitialized data when sent to the connected peer. A remote attacker can gain access to potentially sensitive information.


Remediation

Install update from vendor's website.