CVE-2025-66199
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
27/01/2026
Última modificación:
27/01/2026
Descripción
*** Pendiente de traducción *** Issue summary: A TLS 1.3 connection using certificate compression can be<br />
forced to allocate a large buffer before decompression without checking<br />
against the configured certificate size limit.<br />
<br />
Impact summary: An attacker can cause per-connection memory allocations of<br />
up to approximately 22 MiB and extra CPU work, potentially leading to<br />
service degradation or resource exhaustion (Denial of Service).<br />
<br />
In affected configurations, the peer-supplied uncompressed certificate<br />
length from a CompressedCertificate message is used to grow a heap buffer<br />
prior to decompression. This length is not bounded by the max_cert_list<br />
setting, which otherwise constrains certificate message sizes. An attacker<br />
can exploit this to cause large per-connection allocations followed by<br />
handshake failure. No memory corruption or information disclosure occurs.<br />
<br />
This issue only affects builds where TLS 1.3 certificate compression is<br />
compiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression<br />
algorithm (brotli, zlib, or zstd) is available, and where the compression<br />
extension is negotiated. Both clients receiving a server CompressedCertificate<br />
and servers in mutual TLS scenarios receiving a client CompressedCertificate<br />
are affected. Servers that do not request client certificates are not<br />
vulnerable to client-initiated attacks.<br />
<br />
Users can mitigate this issue by setting SSL_OP_NO_RX_CERTIFICATE_COMPRESSION<br />
to disable receiving compressed certificates.<br />
<br />
The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,<br />
as the TLS implementation is outside the OpenSSL FIPS module boundary.<br />
<br />
OpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.<br />
<br />
OpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.
Impacto
Referencias a soluciones, herramientas e información
- https://github.com/openssl/openssl/commit/3ed1f75249932b155eef993a8e66a99cb98bfef4
- https://github.com/openssl/openssl/commit/6184a4fb08ee6d7bca570d931a4e8bef40b64451
- https://github.com/openssl/openssl/commit/895150b5e021d16b52fb32b97e1dd12f20448be5
- https://github.com/openssl/openssl/commit/966a2478046c311ed7dae50c457d0db4cafbf7e4
- https://openssl-library.org/news/secadv/20260127.txt



