Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-0727

Опубликовано: 26 янв. 2024
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS3: 5.5

Описание

Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant...

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

needed

esm-apps/bionic

needs-triage

esm-apps/xenial

needs-triage

esm-infra/focal

needed

focal

ignored

end of standard support, was needed
jammy

needed

lunar

ignored

end of life, was needs-triage
mantic

ignored

end of life, was needed
noble

needed

Показывать по

РелизСтатусПримечание
bionic

not-affected

uses system openssl1.0
devel

not-affected

uses system openssl
esm-apps/bionic

not-affected

uses system openssl1.0
esm-apps/focal

not-affected

uses system openssl
esm-apps/jammy

needed

esm-apps/noble

not-affected

uses system openssl
esm-apps/xenial

not-affected

uses system openssl
esm-infra-legacy/trusty

not-affected

uses system openssl
focal

not-affected

uses system openssl
jammy

needed

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

released

3.0.10-1ubuntu4
esm-infra-legacy/trusty

not-affected

1.0.1f-1ubuntu2.27+esm10
esm-infra/bionic

released

1.1.1-1ubuntu2.1~18.04.23+esm4
esm-infra/focal

not-affected

1.1.1f-1ubuntu2.21
esm-infra/xenial

released

1.0.2g-1ubuntu4.20+esm11
fips-preview/jammy

needed

fips-updates/bionic

released

1.1.1-1ubuntu2.fips.2.1~18.04.23.4
fips-updates/focal

released

1.1.1f-1ubuntu2.fips.20
fips-updates/jammy

released

3.0.2-0ubuntu1.14+Fips1

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

DNE

esm-infra/bionic

released

1.0.2n-1ubuntu5.13+esm1
esm-infra/focal

DNE

focal

DNE

jammy

DNE

lunar

DNE

mantic

DNE

noble

DNE

oracular

DNE

Показывать по

EPSS

Процентиль: 45%
0.00217
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
redhat
больше 1 года назад

Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant...

CVSS3: 5.5
nvd
больше 1 года назад

Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significan

CVSS3: 5.5
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 5.5
debian
больше 1 года назад

Issue summary: Processing a maliciously formatted PKCS12 file may lead ...

suse-cvrf
больше 1 года назад

Security update for openssl

EPSS

Процентиль: 45%
0.00217
Низкий

5.5 Medium

CVSS3

Уязвимость CVE-2024-0727