Vulnerability Details CVE-2019-14431
In MatrixSSL 3.8.3 Open through 4.2.1 Open, the DTLS server mishandles incoming network messages leading to a heap-based buffer overflow of up to 256 bytes and possible Remote Code Execution in parseSSLHandshake in sslDecode.c. During processing of a crafted packet, the server mishandles the fragment length value provided in the DTLS message.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.012
EPSS Ranking 78.3%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2019-14431
-
cpe:2.3:a:matrixssl:matrixssl:3.8.2
-
cpe:2.3:a:matrixssl:matrixssl:3.8.3
-
cpe:2.3:a:matrixssl:matrixssl:3.8.4
-
cpe:2.3:a:matrixssl:matrixssl:3.8.5
-
cpe:2.3:a:matrixssl:matrixssl:3.8.6
-
cpe:2.3:a:matrixssl:matrixssl:3.8.7
-
cpe:2.3:a:matrixssl:matrixssl:3.8.7a
-
cpe:2.3:a:matrixssl:matrixssl:3.8.7b
-
cpe:2.3:a:matrixssl:matrixssl:3.9.0
-
cpe:2.3:a:matrixssl:matrixssl:3.9.1
-
cpe:2.3:a:matrixssl:matrixssl:3.9.3
-
cpe:2.3:a:matrixssl:matrixssl:3.9.5
-
cpe:2.3:a:matrixssl:matrixssl:4.0.0
-
cpe:2.3:a:matrixssl:matrixssl:4.0.1
-
cpe:2.3:a:matrixssl:matrixssl:4.0.2
-
cpe:2.3:a:matrixssl:matrixssl:4.1.0
-
cpe:2.3:a:matrixssl:matrixssl:4.2.0
-
cpe:2.3:a:matrixssl:matrixssl:4.2.1