Out-of-bounds read in ALPN parsing due to incomplete validation. wolfSSL 5.8.4 and earlier contained an out-of-bounds read in ALPN handling when built with ALPN enabled (HAVE_ALPN / --enable-alpn). A crafted ALPN protocol list could trigger an out-of-bounds read, leading to a potential process crash (denial of service). Note that ALPN is disabled by default, but is enabled for these 3rd party compatibility features: enable-apachehttpd, enable-bind, enable-curl, enable-haproxy, enable-hitch, enable-lighty, enable-jni, enable-nginx, enable-quic.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
apply the fix in wolfssl/wolfssl#9859 (or upgrade to a release that includes it).
Workaround
build without ALPN support if ALPN is not required.
References
| Link | Providers |
|---|---|
| https://github.com/wolfSSL/wolfssl/pull/9859 |
|
History
Thu, 19 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Out-of-bounds read in ALPN parsing due to incomplete validation. wolfSSL 5.8.4 and earlier contained an out-of-bounds read in ALPN handling when built with ALPN enabled (HAVE_ALPN / --enable-alpn). A crafted ALPN protocol list could trigger an out-of-bounds read, leading to a potential process crash (denial of service). Note that ALPN is disabled by default, but is enabled for these 3rd party compatibility features: enable-apachehttpd, enable-bind, enable-curl, enable-haproxy, enable-hitch, enable-lighty, enable-jni, enable-nginx, enable-quic. | |
| Title | wolfSSL: out-of-bounds read (DoS) in ALPN parsing due to incomplete validation | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: wolfSSL
Published:
Updated: 2026-03-19T20:20:42.608Z
Reserved: 2026-03-04T18:38:04.989Z
Link: CVE-2026-3547
No data.
Status : Received
Published: 2026-03-19T21:17:12.653
Modified: 2026-03-19T21:17:12.653
Link: CVE-2026-3547
No data.
OpenCVE Enrichment
No data.
Weaknesses