Vulnerability Description
tls1.c in Cameron Hamilton-Rich axTLS before 2.1.5 has a Buffer Overflow via a crafted sequence of TLS packets because the need_bytes value is mismanaged.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Axtls Project | Axtls | < 2.1.5 |
Related Weaknesses (CWE)
References
- http://axtls.sourceforge.netProductThird Party Advisory
- https://www.telekom.com/en/corporate-responsibility/data-protection-data-securitPatchThird Party Advisory
- https://www.telekom.com/resource/blob/566546/276aaa2eab781729f2544d62edecf002/dlExploitPatchThird Party Advisory
- http://axtls.sourceforge.netProductThird Party Advisory
- https://www.telekom.com/en/corporate-responsibility/data-protection-data-securitPatchThird Party Advisory
- https://www.telekom.com/resource/blob/566546/276aaa2eab781729f2544d62edecf002/dlExploitPatchThird Party Advisory
FAQ
What is CVE-2019-8981?
CVE-2019-8981 is a vulnerability with a CVSS score of 9.8 (CRITICAL). tls1.c in Cameron Hamilton-Rich axTLS before 2.1.5 has a Buffer Overflow via a crafted sequence of TLS packets because the need_bytes value is mismanaged.
How severe is CVE-2019-8981?
CVE-2019-8981 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-8981?
Check the references section above for vendor advisories and patch information. Affected products include: Axtls Project Axtls.