Skip to main content
Mallory

Heap Buffer Overflow Flaws Disclosed in wolfSSL DTLS and Wireshark TLS Parsing

widely-deployed-product-advisoryinternet-facing-service-vulnerabilityendpoint-software-vulnerability
Updated April 30, 2026 at 09:05 AM2 sources
Share:
Heap Buffer Overflow Flaws Disclosed in wolfSSL DTLS and Wireshark TLS Parsing

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Two high-severity memory-corruption vulnerabilities were disclosed in widely used TLS-related software components. CVE-2026-5264 affects wolfSSL and stems from DTLS 1.3 ACK message processing, where a remote attacker can send a crafted ACK packet to trigger a heap buffer overflow. The flaw is classified as CWE-122 and is network-reachable with low attack complexity and no privileges or user interaction required, raising concern for applications that expose DTLS 1.3 services.

A separate flaw, CVE-2026-5402, was disclosed in Wireshark’s TLS protocol dissector and affects versions 4.6.0 through 4.6.4. The vulnerability is also a heap-based buffer overflow (CWE-122) and could allow denial of service and possible code execution when malicious traffic is processed, with the CVSS vector indicating high impact to confidentiality, integrity, and availability. Public references point to a wolfSSL GitHub pull request for the DTLS issue and to a GitLab issue and official Wireshark security advisory for the dissector flaw.

Timeline

  1. Apr 30, 2026

    CVE-2026-5402 disclosed for Wireshark TLS dissector heap overflow

    A new CVE entry, CVE-2026-5402, was received by cve@gitlab.com for a heap-based buffer overflow in Wireshark's TLS protocol dissector affecting versions 4.6.0 through 4.6.4. The issue can cause denial of service and potentially code execution, and references were added to a GitLab issue and an official Wireshark security advisory.

  2. Apr 9, 2026

    CVE-2026-5264 reported for wolfSSL DTLS 1.3 ACK heap overflow

    A new vulnerability, CVE-2026-5264, was received by facts@wolfssl.com involving a heap buffer overflow in DTLS 1.3 ACK message processing. The flaw allows a remote attacker to send a crafted DTLS 1.3 ACK message to trigger the overflow, and a wolfSSL GitHub pull request was referenced in the record.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

April 30, 2026 at 12:00 AM
April 9, 2026 at 12:00 AM

Related Stories

Critical Mbed TLS Flaws Enable Buffer Overflow and Potential Code Execution

Critical Mbed TLS Flaws Enable Buffer Overflow and Potential Code Execution

Two high-severity vulnerabilities were disclosed in **Mbed TLS**, including a buffer overflow in FFDH public key export tracked as `CVE-2026-34875` and a memory-corruption issue tied to serialized SSL context or session structures tracked as `CVE-2026-34877`. The first flaw affects **Mbed TLS through 3.6.5** and **TF-PSA-Crypto 1.0.0**, while the second impacts **Mbed TLS 2.19.0 through 3.6.5** as well as **4.0.0**. Both issues were assigned a `CVSS v3.1` score vector of `AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`, indicating remotely exploitable conditions with low attack complexity and high impact on confidentiality, integrity, and availability. `CVE-2026-34875` is classified under **CWE-120** and occurs during export of FFDH public keys, creating a buffer overflow condition. `CVE-2026-34877` is associated with **CWE-502** and **CWE-250** and can lead to arbitrary code execution if an attacker can alter serialized SSL context or session data before it is processed. Mbed TLS security advisories were published for both flaws, putting organizations that embed the library in network-facing products, cryptographic services, or TLS-enabled applications on notice to review affected versions and vendor guidance immediately.

1 months ago
rust-openssl Flaws Enable Memory Disclosure and Buffer Overwrite

rust-openssl Flaws Enable Memory Disclosure and Buffer Overwrite

Two high-severity vulnerabilities were disclosed in **rust-openssl**, the Rust bindings for OpenSSL, affecting multiple `0.9.x` and `0.10.x` releases prior to **`0.10.78`**. **`CVE-2026-41898`** affects versions from `0.9.24` up to, but not including, `0.10.78`, where several FFI trampoline callback paths passed a closure-returned `usize` to OpenSSL without validating it against the output buffer size. The flaw can trigger buffer overflows and leak adjacent memory to a network peer, and it is mapped to **`CWE-126`** and **`CWE-130`**. A second issue, **`CVE-2026-41681`**, affects versions from `0.10.39` up to, but not including, `0.10.78`, in `MdCtxRef::digest_final()`, which writes `EVP_MD_CTX_size(ctx)` bytes to the caller buffer without checking whether the buffer is large enough. The resulting out-of-bounds write can cause stack corruption and is reachable from safe Rust, with the weakness classified as **`CWE-121`**. Both vulnerabilities were addressed in **`rust-openssl 0.10.78`**, with public advisories, code references, and fix details released alongside the CVE records.

1 weeks ago
Wireshark Fixes Critical Code Execution Flaws Triggered by Malformed Packets

Wireshark Fixes Critical Code Execution Flaws Triggered by Malformed Packets

Wireshark released version **4.6.5** to remediate more than 40 vulnerabilities, including multiple flaws that could allow **arbitrary code execution** when the tool processes malformed network packets or malicious capture and profile files. The most severe issues were reported in the **TLS dissector**, **SBC codec**, **RDP dissector**, and **profile import** functionality, where crashes may be exploitable for code execution. The release also fixes a broad set of **denial-of-service** bugs across numerous protocol dissectors, several **infinite-loop** conditions that can stall unattended analysis workflows, and decompression-related crashes in **zlib** and **LZ77** handling. Because Wireshark is widely deployed in enterprise security operations, packet analysis, and SIEM-connected environments—sometimes with elevated privileges—the patched version is being treated as a high-priority security update.

2 days ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.