Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-0727

Опубликовано: 22 янв. 2024
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.

A flaw was found in OpenSSL. The optional ContentInfo fields can be set to null, even if the "type" is a valid value, which can lead to a null dereference error that may cause a denial of service.

Отчет

This vulnerability is classified as low severity. This is a result of a lack of proper validation in OpenSSL's handling of PKCS12 files. This vulnerability results in a potential Denial of Service scenario wherein maliciously crafted PKCS12 files may cause OpenSSL to crash due to a NULL pointer dereference. However, the impact of this issue is reduced by the fact that exploitation requires processing PKCS12 files from untrusted sources using specific OpenSSL APIs, such as PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes(), and PKCS12_newpass(). Furthermore, while a similar issue was addressed in SMIME_write_PKCS7(), its relevance is diminished as it pertains to writing data rather than parsing, hence not considered security significant. The risk of this vulnerability is limited as Red Hat offerings do not utilize images from untrusted sources by default.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6opensslOut of support scope
Red Hat Enterprise Linux 7opensslOut of support scope
Red Hat Enterprise Linux 8compat-openssl10Fix deferred
Red Hat Enterprise Linux 8edk2Will not fix
Red Hat Enterprise Linux 8opensslFix deferred
Red Hat Enterprise Linux 8shimNot affected
Red Hat Enterprise Linux 9compat-openssl11Fix deferred
Red Hat Enterprise Linux 9shimNot affected
Red Hat Enterprise Linux 9opensslFixedRHSA-2024:244730.04.2024
Red Hat Enterprise Linux 9edk2FixedRHSA-2024:908812.11.2024

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=2259944openssl: denial of service via null dereference

EPSS

Процентиль: 45%
0.00217
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 1 года назад

Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant...

CVSS3: 5.5
nvd
больше 1 года назад

Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significan

CVSS3: 5.5
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 5.5
debian
больше 1 года назад

Issue summary: Processing a maliciously formatted PKCS12 file may lead ...

suse-cvrf
больше 1 года назад

Security update for openssl

EPSS

Процентиль: 45%
0.00217
Низкий

5.5 Medium

CVSS3

Уязвимость CVE-2024-0727