CVE-2024-0727
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/01/2024
Last modified:
14/10/2024
Description
Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL<br />
to crash leading to a potential Denial of Service attack<br />
<br />
Impact summary: Applications loading files in the PKCS12 format from untrusted<br />
sources might terminate abruptly.<br />
<br />
A file in PKCS12 format can contain certificates and keys and may come from an<br />
untrusted source. The PKCS12 specification allows certain fields to be NULL, but<br />
OpenSSL does not correctly check for this case. This can lead to a NULL pointer<br />
dereference that results in OpenSSL crashing. If an application processes PKCS12<br />
files from an untrusted source using the OpenSSL APIs then that application will<br />
be vulnerable to this issue.<br />
<br />
OpenSSL APIs that are vulnerable to this are: PKCS12_parse(),<br />
PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes()<br />
and PKCS12_newpass().<br />
<br />
We have also fixed a similar issue in SMIME_write_PKCS7(). However since this<br />
function is related to writing data we do not consider it security significant.<br />
<br />
The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 1.0.2 (including) | 1.0.2zj (excluding) |
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 1.1.1 (including) | 1.1.1x (excluding) |
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.0.0 (including) | 3.0.13 (excluding) |
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.1.0 (including) | 3.1.5 (excluding) |
cpe:2.3:a:openssl:openssl:3.2.0:-:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/openssl/openssl/commit/09df4395b5071217b76dc7d3d2e630eb8c5a79c2
- https://github.com/openssl/openssl/commit/775acfdbd0c6af9ac855f34969cdab0c0c90844a
- https://github.com/openssl/openssl/commit/d135eeab8a5dbf72b3da5240bab9ddb7678dbd2c
- https://github.openssl.org/openssl/extended-releases/commit/03b3941d60c4bce58fab69a0c22377ab439bc0e8
- https://github.openssl.org/openssl/extended-releases/commit/aebaa5883e31122b404e450732dc833dc9dee539
- https://www.openssl.org/news/secadv/20240125.txt