Search CVE reports
11 – 20 of 37797 results
wolfSSL's ECCSI signature verifier `wc_VerifyEccsiHash` decodes the `r` and `s` scalars from the signature blob via `mp_read_unsigned_bin` with no check that they lie in `[1, q-1]`. A crafted forged signature could verify against...
1 affected package
wolfssl
| Package | 22.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
A heap use-after-free exists in wolfSSL's TLS 1.3 post-quantum cryptography (PQC) hybrid KeyShare processing. In the error handling path of TLSX_KeyShare_ProcessPqcHybridClient() in src/tls.c, the inner...
1 affected package
wolfssl
| Package | 22.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
X.509 date buffer overflow in wolfSSL_X509_notAfter / wolfSSL_X509_notBefore. A buffer overflow may occur when parsing date fields from a crafted X.509 certificate via the compatibility layer API. This is only triggered when...
1 affected package
wolfssl
| Package | 22.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
Heap buffer overflow in CertFromX509 via AuthorityKeyIdentifier size confusion. A heap buffer overflow occurs when converting an X.509 certificate internally due to incorrect size handling of the AuthorityKeyIdentifier extension.
1 affected package
wolfssl
| Package | 22.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
In wolfSSL, ARIA-GCM cipher suites used in TLS 1.2 and DTLS 1.2 reuse an identical 12-byte GCM nonce for every application-data record. Because wc_AriaEncrypt is stateless and passes the caller-supplied IV verbatim to the...
1 affected package
wolfssl
| Package | 22.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
An out-of-bounds read vulnerability exists in the `DecodeLookupTable` function within `DicomImageDecoder.cpp`. The lookup-table decoding logic used for `PALETTE COLOR` images does not validate pixel indices against the lookup...
1 affected package
orthanc
| Package | 22.04 LTS |
|---|---|
| orthanc | Needs evaluation |
A heap buffer overflow vulnerability exists in the PAM image parsing logic. When Orthanc processes a crafted PAM image embedded in a DICOM file, image dimensions are multiplied using 32-bit unsigned arithmetic. Specially chosen...
1 affected package
orthanc
| Package | 22.04 LTS |
|---|---|
| orthanc | Needs evaluation |
A heap buffer overflow vulnerability exists during the decoding of `PALETTE COLOR` DICOM images. Pixel length validation uses 32-bit multiplication for width and height calculations. If these values overflow, the validation check...
1 affected package
orthanc
| Package | 22.04 LTS |
|---|---|
| orthanc | Needs evaluation |
A heap buffer overflow vulnerability exists in the DICOM image decoder. Dimension fields are encoded using Value Representation (VR) Unsigned Long (UL), instead of the expected VR Unsigned Short (US), which allows extremely large...
1 affected package
orthanc
| Package | 22.04 LTS |
|---|---|
| orthanc | Needs evaluation |
An out-of-bounds read vulnerability exists in the `DecodePsmctRle1` function of `DicomImageDecoder.cpp`. The `PMSCT_RLE1` decompression routine, which decodes the proprietary Philips Compression format, does not properly validate...
1 affected package
orthanc
| Package | 22.04 LTS |
|---|---|
| orthanc | Needs evaluation |