Home
MEDIUM: 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:L/SC:N/SI:N/SA:NDefault status
unaffected
1.4.12 (semver) before 1.4.21
affected
Description
A heap buffer over-read vulnerability exists in the wolfSSH_CleanPath() function in wolfSSH. An authenticated remote attacker can trigger the issue via crafted SCP path input containing '/./' sequences, resulting in a heap over read by 1 byte.
Problem types
Product status
1.4.12 (semver) before 1.4.21
Credits
Luigino Camastra
References
github.com/wolfSSL/wolfssh/pull/859