Matrix SSL 4.x through 4.6.0 and Rambus TLS Toolkit have...
High severity
Unreviewed
Published
Dec 22, 2023
to the GitHub Advisory Database
•
Updated Jan 12, 2024
Description
Published by the National Vulnerability Database
Dec 22, 2023
Published to the GitHub Advisory Database
Dec 22, 2023
Last updated
Jan 12, 2024
Matrix SSL 4.x through 4.6.0 and Rambus TLS Toolkit have a length-subtraction integer overflow for Client Hello Pre-Shared Key extension parsing in the TLS 1.3 server. An attacked device calculates an SHA-2 hash over at least 65 KB (in RAM). With a large number of crafted TLS messages, the CPU becomes heavily loaded. This occurs in tls13VerifyBinder and tls13TranscriptHashUpdate.
References