Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-51961 | Heap buffer overflow in the server site handshake implementation in Real Time Logic LLC's SharkSSL version (from 05/05/24) commit 64808a5e12c83b38f85c943dee0112e428dc2a43 allows a remote attacker to trigger a Denial-of-Service via a malformed Client-Hello message. |
Tue, 28 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV3_1
|
Thu, 23 Jan 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Heap buffer overflow in the server site handshake implementation in Real Time Logic LLC's SharkSSL version (from 05/05/24) commit 64808a5e12c83b38f85c943dee0112e428dc2a43 allows a remote attacker to trigger a Denial-of-Service via a malformed Client-Hello message. | |
| References |
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-27T19:06:26.144Z
Reserved: 2024-11-20T00:00:00.000Z
Link: CVE-2024-53379
Updated: 2025-01-28T20:39:10.280Z
Status : Deferred
Published: 2025-01-23T23:15:07.993
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-53379
No data.
OpenCVE Enrichment
No data.
EUVD