A Heap buffer overflow in the server-site handshake implementation in Real Time Logic SharkSSL from 09/09/24 and earlier allows a remote attacker to trigger a Denial-of-Service via a malformed TLS Client Key Exchange message.
                
            References
                    Configurations
                    No configuration.
History
                    15 Sep 2025, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-122 | 
21 Nov 2024, 21:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | (en) A Heap buffer overflow in the server-site handshake implementation in Real Time Logic SharkSSL from 09/09/24 and earlier allows a remote attacker to trigger a Denial-of-Service via a malformed TLS Client Key Exchange message. | 
18 Nov 2024, 19:35
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-120 | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 5.3 | 
13 Nov 2024, 17:01
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
12 Nov 2024, 22:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-11-12 22:15
Updated : 2025-09-15 20:15
NVD link : CVE-2024-48075
Mitre link : CVE-2024-48075
CVE.ORG link : CVE-2024-48075
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-122
                        
            Heap-based Buffer Overflow
