Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-68160

Опубликовано: 27 янв. 2026
Источник: nvd
CVSS3: 4.7
EPSS Низкий

Описание

Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write.

Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application.

The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity.

The FIPS modules in 3.6, 3.5, 3.4, 3.3 an

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
Версия от 1.0.2 (включая) до 1.0.2zn (исключая)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
Версия от 1.1.1 (включая) до 1.1.1ze (исключая)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
Версия от 3.0.0 (включая) до 3.0.19 (исключая)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
Версия от 3.3.0 (включая) до 3.3.6 (исключая)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
Версия от 3.4.0 (включая) до 3.4.4 (исключая)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
Версия от 3.5.0 (включая) до 3.5.5 (исключая)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
Версия от 3.6.0 (включая) до 3.6.1 (исключая)

EPSS

Процентиль: 2%
0.00014
Низкий

4.7 Medium

CVSS3

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 4.7
ubuntu
8 дней назад

Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 an...

CVSS3: 4.7
debian
8 дней назад

Issue summary: Writing large, newline-free data into a BIO chain using ...

CVSS3: 4.7
github
8 дней назад

Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3...

suse-cvrf
7 дней назад

Security update for openssl-1_0_0

suse-cvrf
7 дней назад

Security update for openssl-1_0_0

EPSS

Процентиль: 2%
0.00014
Низкий

4.7 Medium

CVSS3

Дефекты

CWE-787