Heap buffer overflow in the server site handshake implementation in Real Time Logic LLC's SharkSSL version (from 05/05/24) commit 64808a5e12c83b38f85c943dee0112e428dc2a43 allows a remote attacker to trigger a Denial-of-Service via a malformed Client-Hello message.
History

Tue, 28 Jan 2025 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Jan 2025 22:30:00 +0000

Type Values Removed Values Added
Description Heap buffer overflow in the server site handshake implementation in Real Time Logic LLC's SharkSSL version (from 05/05/24) commit 64808a5e12c83b38f85c943dee0112e428dc2a43 allows a remote attacker to trigger a Denial-of-Service via a malformed Client-Hello message.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-01-23T00:00:00.000Z

Updated: 2025-02-27T19:06:26.144Z

Reserved: 2024-11-20T00:00:00.000Z

Link: CVE-2024-53379

cve-icon Vulnrichment

Updated: 2025-01-28T20:39:10.280Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-01-23T23:15:07.993

Modified: 2025-02-27T19:15:48.927

Link: CVE-2024-53379

cve-icon Redhat

No data.