Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-3711

Опубликовано: 24 авг. 2021
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS2: 7.5
CVSS3: 9.8

Описание

In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen dat...

РелизСтатусПримечание
bionic

not-affected

code not compiled
devel

not-affected

code not compiled
esm-apps/bionic

not-affected

code not compiled
esm-apps/xenial

not-affected

code not compiled
esm-infra-legacy/trusty

DNE

esm-infra/focal

not-affected

code not compiled
focal

not-affected

code not compiled
hirsute

not-affected

code not compiled
impish

not-affected

code not compiled
jammy

not-affected

code not compiled

Показывать по

РелизСтатусПримечание
bionic

not-affected

uses system openssl1.0
devel

not-affected

uses system openssl1.1
esm-apps/bionic

not-affected

uses system openssl1.0
esm-apps/focal

not-affected

uses system openssl1.1
esm-apps/jammy

not-affected

uses system openssl1.1
esm-apps/noble

not-affected

uses system openssl1.1
esm-apps/xenial

not-affected

uses system openssl
esm-infra-legacy/trusty

not-affected

uses system openssl
focal

not-affected

uses system openssl1.1
hirsute

not-affected

uses system openssl1.1

Показывать по

РелизСтатусПримечание
bionic

released

1.1.1-1ubuntu2.1~18.04.13
devel

released

1.1.1l-1ubuntu1
esm-infra-legacy/trusty

not-affected

esm-infra/bionic

not-affected

1.1.1-1ubuntu2.1~18.04.13
esm-infra/focal

not-affected

1.1.1f-1ubuntu2.8
esm-infra/xenial

not-affected

fips-preview/jammy

released

1.1.1l-1ubuntu1
fips-updates/bionic

released

1.1.1-1ubuntu2.fips.2.1~18.04.13.2
fips-updates/focal

released

1.1.1f-1ubuntu2.fips.7.2
fips-updates/jammy

released

1.1.1l-1ubuntu1

Показывать по

РелизСтатусПримечание
bionic

not-affected

devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

esm-infra/focal

DNE

focal

DNE

hirsute

DNE

impish

DNE

jammy

DNE

kinetic

DNE

Показывать по

EPSS

Процентиль: 85%
0.02752
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
redhat
почти 4 года назад

In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen dat...

CVSS3: 9.8
nvd
почти 4 года назад

In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data t

msrc
больше 3 лет назад

OpenSSL: CVE-2021-3711 SM2 Decryption Buffer Overflow

CVSS3: 9.8
debian
почти 4 года назад

In order to decrypt SM2 encrypted data an application is expected to c ...

CVSS3: 9.8
github
около 3 лет назад

SM2 Decryption Buffer Overflow

EPSS

Процентиль: 85%
0.02752
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3

Уязвимость CVE-2021-3711