Metrics
Affected Vendors & Products
No advisories yet.
Solution
Fix Bug 1: Add a bounds check requiring at least 2 output slots before writing the first OID arc split (y == 0 case). Fix Bug 2: Change callers to pass the element count (MAX_OID_SZ) instead of sizeof(decOid) as the output buffer size parameter.
Workaround
Do not enable WC_ASN_UNKNOWN_EXT_CB or do not register an unknown extension callback if not required. This mitigates the network-reachable variant (Bug 2) but does not address Bug 1.
| Link | Providers |
|---|---|
| https://github.com/wolfSSL/wolfssl |
|
Thu, 09 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Two potential heap out-of-bounds write locations existed in DecodeObjectId() in wolfcrypt/src/asn.c. First, a bounds check only validates one available slot before writing two OID arc values (out[0] and out[1]), enabling a 2-byte out-of-bounds write when outSz equals 1. Second, multiple callers pass sizeof(decOid) (64 bytes on 64-bit platforms) instead of the element count MAX_OID_SZ (32), causing the function to accept crafted OIDs with 33 or more arcs that write past the end of the allocated buffer. | |
| Title | Heap Out-of-Bounds Write in DecodeObjectId() in wolfSSL | |
| Weaknesses | CWE-122 CWE-787 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: wolfSSL
Published:
Updated: 2026-04-09T19:45:39.937Z
Reserved: 2026-03-30T19:57:33.843Z
Link: CVE-2026-5187
No data.
Status : Received
Published: 2026-04-09T20:16:28.233
Modified: 2026-04-09T20:16:28.233
Link: CVE-2026-5187
No data.
OpenCVE Enrichment
No data.