Heap buffer overflow in the server site handshake implementation in Real Time Logic LLC's SharkSSL version (from 05/05/24) commit 64808a5e12c83b38f85c943dee0112e428dc2a43 allows a remote attacker to trigger a Denial-of-Service via a malformed Client-Hello message.
Metrics
Affected Vendors & Products
References
History
Tue, 28 Jan 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-120 | |
References |
| |
Metrics |
cvssV3_1
|
Thu, 23 Jan 2025 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Heap buffer overflow in the server site handshake implementation in Real Time Logic LLC's SharkSSL version (from 05/05/24) commit 64808a5e12c83b38f85c943dee0112e428dc2a43 allows a remote attacker to trigger a Denial-of-Service via a malformed Client-Hello message. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-01-23T00:00:00.000Z
Updated: 2025-02-27T19:06:26.144Z
Reserved: 2024-11-20T00:00:00.000Z
Link: CVE-2024-53379

Updated: 2025-01-28T20:39:10.280Z

Status : Awaiting Analysis
Published: 2025-01-23T23:15:07.993
Modified: 2025-02-27T19:15:48.927
Link: CVE-2024-53379

No data.