CVE-2024-5535 | OpenSSL up to 3.3.1 Client Protocol SSL_select_next_proto client/client_len memory corruption (Nessus ID 208438)
A vulnerability was found in OpenSSL up to 3.3.1. It has been declared as critical. This vulnerability affects the function SSL_select_next_proto of the component Client Protocol Handler. The manipulation of the argument client/client_len leads to memory corruption.
This vulnerability was named CVE-2024-5535. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.