Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2026-31789

Gravedad CVSS v3.1:
CRÍTICA
Tipo:
CWE-787 Escritura fuera de límites
Fecha de publicación:
07/04/2026
Última modificación:
12/05/2026

Descripción

*** Pendiente de traducción *** Issue summary: Converting an excessively large OCTET STRING value to<br /> a hexadecimal string leads to a heap buffer overflow on 32 bit platforms.<br /> <br /> Impact summary: A heap buffer overflow may lead to a crash or possibly<br /> an attacker controlled code execution or other undefined behavior.<br /> <br /> If an attacker can supply a crafted X.509 certificate with an excessively<br /> large OCTET STRING value in extensions such as the Subject Key Identifier<br /> (SKID) or Authority Key Identifier (AKID) which are being converted to hex,<br /> the size of the buffer needed for the result is calculated as multiplication<br /> of the input length by 3. On 32 bit platforms, this multiplication may overflow<br /> resulting in the allocation of a smaller buffer and a heap buffer overflow.<br /> <br /> Applications and services that print or log contents of untrusted X.509<br /> certificates are vulnerable to this issue. As the certificates would have<br /> to have sizes of over 1 Gigabyte, printing or logging such certificates<br /> is a fairly unlikely operation and only 32 bit platforms are affected,<br /> this issue was assigned Low severity.<br /> <br /> The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this<br /> issue, as the affected code is outside the OpenSSL FIPS module boundary.

Productos y versiones vulnerables

CPE Desde Hasta
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 3.0.0 (incluyendo) 3.0.20 (excluyendo)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 3.3.0 (incluyendo) 3.3.7 (excluyendo)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 3.4.0 (incluyendo) 3.4.5 (excluyendo)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 3.5.0 (incluyendo) 3.5.6 (excluyendo)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 3.6.0 (incluyendo) 3.6.2 (excluyendo)