Description
A Heap buffer overflow in the server-site handshake implementation in Real Time Logic SharkSSL from 09/09/24 and earlier allows a remote attacker to trigger a Denial-of-Service via a malformed TLS Client Key Exchange message.
Published: 2024-11-12
Score: 5.3 Medium
EPSS: 1.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-42927 A Heap buffer overflow in the server-site handshake implementation in Real Time Logic SharkSSL from 09/09/24 and earlier allows a remote attacker to trigger a Denial-of-Service via a malformed TLS Client Key Exchange message.
History

Mon, 15 Sep 2025 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120

Mon, 15 Sep 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-122

Thu, 21 Nov 2024 21:00:00 +0000

Type Values Removed Values Added
Description A Heap buffer overflow in the server-site handshake implementation in Real Time Logic SharkSSL 09.09.24 and earlier allows a remote attacker to trigger a Denial-of-Service via a malformed TLS Client Key Exchange message. A Heap buffer overflow in the server-site handshake implementation in Real Time Logic SharkSSL from 09/09/24 and earlier allows a remote attacker to trigger a Denial-of-Service via a malformed TLS Client Key Exchange message.

Mon, 18 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Realtimelogic
Realtimelogic sharkssl
Weaknesses CWE-120
CPEs cpe:2.3:a:realtimelogic:sharkssl:*:*:*:*:*:*:*:*
Vendors & Products Realtimelogic
Realtimelogic sharkssl
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 12 Nov 2024 21:30:00 +0000

Type Values Removed Values Added
Description A Heap buffer overflow in the server-site handshake implementation in Real Time Logic SharkSSL 09.09.24 and earlier allows a remote attacker to trigger a Denial-of-Service via a malformed TLS Client Key Exchange message.
References

Subscriptions

Realtimelogic Sharkssl
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-09-15T19:22:30.834Z

Reserved: 2024-10-08T00:00:00.000Z

Link: CVE-2024-48075

cve-icon Vulnrichment

Updated: 2024-11-18T18:18:20.115Z

cve-icon NVD

Status : Deferred

Published: 2024-11-12T22:15:15.290

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-48075

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses