A heap buffer over-read vulnerability exists in the wolfSSH_CleanPath() function in wolfSSH. An authenticated remote attacker can trigger the issue via crafted SCP path input containing '/./' sequences, resulting in a heap over read by 1 byte.
| Software | From | Fixed in |
|---|---|---|
| wolfssh / wolfssh | 1.4.12 | 1.4.22 |