curl disclosed on HackerOne: Stack Buffer Overflow in cURL wolfSSL...
**Summary:**
A stack-based buffer overflow exists in the wssl_strerror function of cURL's wolfSSL TLS backend. The function uses an unsafe strcpy call, relying solely on a DEBUGASSERT macro for boundary checking. This macro is disabled in production release builds (-DNDEBUG), allowing memory corruption when the function is called with a buffer size parameter of 40 bytes or less.
**Affected...
hackerone.com · HackerOne