Vulnerability Details : CVE-2022-38152
An issue was discovered in wolfSSL before 5.5.0. When a TLS 1.3 client connects to a wolfSSL server and SSL_clear is called on its session, the server crashes with a segmentation fault. This occurs in the second session, which is created through TLS session resumption and reuses the initial struct WOLFSSL. If the server reuses the previous session structure (struct WOLFSSL) by calling wolfSSL_clear(WOLFSSL* ssl) on it, the next received Client Hello (that resumes the previous session) crashes the server. Note that this bug is only triggered when resuming sessions using TLS session resumption. Only servers that use wolfSSL_clear instead of the recommended SSL_free; SSL_new sequence are affected. Furthermore, wolfSSL_clear is part of wolfSSL's compatibility layer and is not enabled by default. It is not part of wolfSSL's native API.
Vulnerability category: Memory Corruption
Products affected by CVE-2022-38152
- cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-38152
0.52%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 78 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-38152
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2022-38152
-
The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-38152
-
http://seclists.org/fulldisclosure/2023/Jan/7
Full Disclosure: wolfSSL before 5.5.0: Denial-of-service with session resumptionExploit;Mailing List;Third Party Advisory
-
https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/
Keeping the wolves out of wolfSSL | Trail of Bits BlogThird Party Advisory
-
https://github.com/wolfSSL/wolfssl/releases
Releases · wolfSSL/wolfssl · GitHubRelease Notes
-
http://packetstormsecurity.com/files/170604/wolfSSL-Session-Resumption-Denial-Of-Service.html
wolfSSL Session Resumption Denial Of Service ≈ Packet StormExploit;Third Party Advisory
-
https://www.wolfssl.com/docs/security-vulnerabilities/
wolfSSL Security Vulnerabilities | wolfSSL Embedded SSL/TLS LibraryVendor Advisory
-
https://github.com/wolfSSL/wolfssl/pull/5468
Fixes to better handle re-use of a WOLFSSL object via wolfSSL_clear by SparkiDev · Pull Request #5468 · wolfSSL/wolfssl · GitHubExploit;Patch;Third Party Advisory
-
https://github.com/tlspuffin/tlspuffin
GitHub - tlspuffin/tlspuffin: A symbolic-model-guided fuzzer for TLSNot Applicable
Jump to