CVE-2021-3336
Summary
| CVE | CVE-2021-3336 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-01-29 05:15:00 UTC |
| Updated | 2021-03-04 21:20:00 UTC |
| Description | DoTls13CertificateVerify in tls13.c in wolfSSL before 4.7.0 does not cease processing for certain anomalous peer behavior (sending an ED22519, ED448, ECC, or RSA signature without the corresponding certificate). The client side is affected because man-in-the-middle attackers can impersonate TLS 1.3 servers. |
Risk And Classification
Problem Types: CWE-295
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| TLS 1.3: ensure key for signature in CertificateVerify by SparkiDev · Pull Request #3676 · wolfSSL/wolfssl · GitHub | MISC | github.com | Patch, Third Party Advisory |
| wolfSSL Security Vulnerabilities | wolfSSL Embedded SSL/TLS Library | CONFIRM | www.wolfssl.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 179418 Debian Security Update for wolfssl (CVE-2021-3336)