Heap-based Buffer Overflow and Invalid Free in ASN.1 Certificate Parsing of wolfSSL 4.1.0 - 4.2.0c

Heap-based Buffer Overflow and Invalid Free in ASN.1 Certificate Parsing of wolfSSL 4.1.0 - 4.2.0c

CVE-2019-18840 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

In wolfSSL 4.1.0 through 4.2.0c, there are missing sanity checks of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer overflow inside the DecodedCert structure in GetName in wolfcrypt/src/asn.c because the domain name location index is mishandled. Because a pointer is overwritten, there is an invalid free.

Learn more about our Web Application Penetration Testing UK.