Out-of-bounds read in ALPN parsing due to incomplete validation. wolfSSL 5.8.4 and earlier contained an out-of-bounds read in ALPN handling when built with ALPN enabled (HAVE_ALPN / --enable-alpn). A crafted ALPN protocol list could trigger an out-of-bounds read, leading to a potential process crash (denial of service). Note that ALPN is disabled by default, but is enabled for these 3rd party compatibility features: enable-apachehttpd, enable-bind, enable-curl, enable-haproxy, enable-hitch, enable-lighty, enable-jni, enable-nginx, enable-quic.
References
| Link | Resource |
|---|---|
| https://github.com/wolfSSL/wolfssl/pull/9859 |
Configurations
No configuration.
History
19 Mar 2026, 21:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-19 21:17
Updated : 2026-03-20 13:39
NVD link : CVE-2026-3547
Mitre link : CVE-2026-3547
CVE.ORG link : CVE-2026-3547
JSON object : View
Products Affected
No product.
CWE
CWE-125
Out-of-bounds Read
