CVE-2024-0901

Remotely executed SEGV and out of bounds read allows malicious packet sender to crash or cause an out of bounds read via sending a malformed packet with the correct length.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*

History

15 Dec 2025, 21:42

Type Values Removed Values Added
First Time Wolfssl
Wolfssl wolfssl
CPE cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
References () https://github.com/wolfSSL/wolfssl/issues/7089 - () https://github.com/wolfSSL/wolfssl/issues/7089 - Exploit, Issue Tracking
References () https://github.com/wolfSSL/wolfssl/pull/7099 - () https://github.com/wolfSSL/wolfssl/pull/7099 - Issue Tracking, Patch

21 Nov 2024, 08:47

Type Values Removed Values Added
References () https://github.com/wolfSSL/wolfssl/issues/7089 - () https://github.com/wolfSSL/wolfssl/issues/7089 -
References () https://github.com/wolfSSL/wolfssl/pull/7099 - () https://github.com/wolfSSL/wolfssl/pull/7099 -

25 Mar 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-25 23:15

Updated : 2025-12-15 21:42


NVD link : CVE-2024-0901

Mitre link : CVE-2024-0901

CVE.ORG link : CVE-2024-0901


JSON object : View

Products Affected

wolfssl

  • wolfssl
CWE
CWE-129

Improper Validation of Array Index