A Heap buffer overflow in the server-site handshake implementation in Real Time Logic SharkSSL from 09/09/24 and earlier allows a remote attacker to trigger a Denial-of-Service via a malformed TLS Client Key Exchange message.
References
Configurations
No configuration.
History
15 Sep 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-122 |
21 Nov 2024, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) A Heap buffer overflow in the server-site handshake implementation in Real Time Logic SharkSSL from 09/09/24 and earlier allows a remote attacker to trigger a Denial-of-Service via a malformed TLS Client Key Exchange message. |
18 Nov 2024, 19:35
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-120 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
13 Nov 2024, 17:01
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
12 Nov 2024, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-11-12 22:15
Updated : 2025-09-15 20:15
NVD link : CVE-2024-48075
Mitre link : CVE-2024-48075
CVE.ORG link : CVE-2024-48075
JSON object : View
Products Affected
No product.
CWE
CWE-122
Heap-based Buffer Overflow
