Report: CVE-2026-3547 - wolfSSL: out-of-bounds read (DoS) in ALPN parsing due to incomplete validation

Report: CVE-2026-3547 - wolfSSL: out-of-bounds read (DoS) in ALPN parsing due to incomplete validation

CVE ID :CVE-2026-3547 Published : March 19, 2026, 9:17 p.m. | 28 minutes ago Description :Out-of-bounds read in ALPN parsing due to incomplete validation. wolfSSL 5.8.4 and earlier contained an out-of-bounds read in ALPN handling when built with ALPN enabled (HAVE_ALPN / --enable-alpn). A crafted ALPN protocol list could trigger an out-of-bounds read, leading to a potential process crash (denial of service). Note that ALPN is disabled by default, but is enabled for these 3rd party compatibility features: enable-apachehttpd, enable-bind, enable-curl, enable-haproxy, enable-hitch, enable-lighty, enable-jni, enable-nginx, enable-quic. Severity: 7.5 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
HIGH
Published
March 19, 2026
Affected Product: nginx
Impact: denial of service