CVE-2025-69420
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/01/2026
Last modified:
27/01/2026
Description
Issue summary: A type confusion vulnerability exists in the TimeStamp Response<br />
verification code where an ASN1_TYPE union member is accessed without first<br />
validating the type, causing an invalid or NULL pointer dereference when<br />
processing a malformed TimeStamp Response file.<br />
<br />
Impact summary: An application calling TS_RESP_verify_response() with a<br />
malformed TimeStamp Response can be caused to dereference an invalid or<br />
NULL pointer when reading, resulting in a Denial of Service.<br />
<br />
The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2()<br />
access the signing cert attribute value without validating its type.<br />
When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory<br />
through the ASN1_TYPE union, causing a crash.<br />
<br />
Exploiting this vulnerability requires an attacker to provide a malformed<br />
TimeStamp Response to an application that verifies timestamp responses. The<br />
TimeStamp protocol (RFC 3161) is not widely used and the impact of the<br />
exploit is just a Denial of Service. For these reasons the issue was<br />
assessed as Low severity.<br />
<br />
The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,<br />
as the TimeStamp Response implementation is outside the OpenSSL FIPS module<br />
boundary.<br />
<br />
OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.<br />
<br />
OpenSSL 1.0.2 is not affected by this issue.
Impact
References to Advisories, Solutions, and Tools
- https://github.com/openssl/openssl/commit/27c7012c91cc986a598d7540f3079dfde2416eb9
- https://github.com/openssl/openssl/commit/4e254b48ad93cc092be3dd62d97015f33f73133a
- https://github.com/openssl/openssl/commit/564fd9c73787f25693bf9e75faf7bf6bb1305d4e
- https://github.com/openssl/openssl/commit/5eb0770ffcf11b785cf374ff3c19196245e54f1b
- https://github.com/openssl/openssl/commit/a99349ebfc519999edc50620abe24d599b9eb085
- https://openssl-library.org/news/secadv/20260127.txt



