CVE-2025-9232
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
30/09/2025
Last modified:
04/11/2025
Description
Issue summary: An application using the OpenSSL HTTP client API functions may<br />
trigger an out-of-bounds read if the &#39;no_proxy&#39; environment variable is set and<br />
the host portion of the authority component of the HTTP URL is an IPv6 address.<br />
<br />
Impact summary: An out-of-bounds read can trigger a crash which leads to<br />
Denial of Service for an application.<br />
<br />
The OpenSSL HTTP client API functions can be used directly by applications<br />
but they are also used by the OCSP client functions and CMP (Certificate<br />
Management Protocol) client implementation in OpenSSL. However the URLs used<br />
by these implementations are unlikely to be controlled by an attacker.<br />
<br />
In this vulnerable code the out of bounds read can only trigger a crash.<br />
Furthermore the vulnerability requires an attacker-controlled URL to be<br />
passed from an application to the OpenSSL function and the user has to have<br />
a &#39;no_proxy&#39; environment variable set. For the aforementioned reasons the<br />
issue was assessed as Low severity.<br />
<br />
The vulnerable code was introduced in the following patch releases:<br />
3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.<br />
<br />
The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this<br />
issue, as the HTTP client implementation is outside the OpenSSL FIPS module<br />
boundary.
Impact
Base Score 3.x
5.90
Severity 3.x
MEDIUM
References to Advisories, Solutions, and Tools
- https://github.com/openssl/openssl/commit/2b4ec20e47959170422922eaff25346d362dcb35
- https://github.com/openssl/openssl/commit/654dc11d23468a74fc8ea4672b702dd3feb7be4b
- https://github.com/openssl/openssl/commit/7cf21a30513c9e43c4bc3836c237cf086e194af3
- https://github.com/openssl/openssl/commit/89e790ac431125a4849992858490bed6b225eadf
- https://github.com/openssl/openssl/commit/bbf38c034cdabd0a13330abcc4855c866f53d2e0
- https://openssl-library.org/news/secadv/20250930.txt
- http://www.openwall.com/lists/oss-security/2025/09/30/5



