Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-11187

Опубликовано: 27 янв. 2026
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 6.1

Описание

Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification. Impact summary: The stack buffer overflow or NULL pointer dereference may cause a crash leading to Denial of Service for an application that parses untrusted PKCS#12 files. The buffer overflow may also potentially enable code execution depending on platform mitigations. When verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2 salt and keylength parameters from the file are used without validation. If the value of keylength exceeds the size of the fixed stack buffer used for the derived key (64 bytes), the key derivation will overflow the buffer. The overflow length is attacker-controlled. Also, if the salt parameter is not an OCTET STRING type this can lead to invalid or NULL pointer dereference. Exploiting this issue requires a user or application to process a maliciously crafted ...

РелизСтатусПримечание
devel

not-affected

code not compiled
esm-apps/bionic

not-affected

3.4.x+ only
esm-apps/xenial

not-affected

3.4.x+ only
esm-infra/focal

not-affected

3.4.x+ only
jammy

not-affected

3.4.x+ only
noble

not-affected

3.4.x+ only
plucky

ignored

end of life, was needs-triage
questing

not-affected

code not compiled
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

not-affected

uses system openssl
esm-apps/bionic

needs-triage

esm-apps/focal

not-affected

uses system openssl
esm-apps/jammy

needed

esm-apps/noble

not-affected

uses system openssl
esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

not-affected

uses system openssl
jammy

needed

noble

not-affected

uses system openssl
plucky

not-affected

uses system openssl

Показывать по

РелизСтатусПримечание
devel

needed

esm-infra-legacy/trusty

not-affected

3.4.x+ only
esm-infra/bionic

not-affected

3.4.x+ only
esm-infra/focal

not-affected

3.4.x+ only
esm-infra/xenial

not-affected

3.4.x+ only
fips-preview/jammy

not-affected

3.4.x+ only
fips-updates/bionic

not-affected

3.4.x+ only
fips-updates/focal

not-affected

3.4.x+ only
fips-updates/jammy

not-affected

3.4.x+ only
fips-updates/xenial

not-affected

3.4.x+ only

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/bionic

not-affected

3.4.x+ only
jammy

DNE

noble

DNE

plucky

DNE

questing

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 1%
0.00011
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
nvd
8 дней назад

Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification. Impact summary: The stack buffer overflow or NULL pointer dereference may cause a crash leading to Denial of Service for an application that parses untrusted PKCS#12 files. The buffer overflow may also potentially enable code execution depending on platform mitigations. When verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2 salt and keylength parameters from the file are used without validation. If the value of keylength exceeds the size of the fixed stack buffer used for the derived key (64 bytes), the key derivation will overflow the buffer. The overflow length is attacker-controlled. Also, if the salt parameter is not an OCTET STRING type this can lead to invalid or NULL pointer dereference. Exploiting this issue requires a user or application to process a maliciously crafted

CVSS3: 6.1
debian
8 дней назад

Issue summary: PBMAC1 parameters in PKCS#12 files are missing validati ...

CVSS3: 6.1
github
8 дней назад

Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification. Impact summary: The stack buffer overflow or NULL pointer dereference may cause a crash leading to Denial of Service for an application that parses untrusted PKCS#12 files. The buffer overflow may also potentially enable code execution depending on platform mitigations. When verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2 salt and keylength parameters from the file are used without validation. If the value of keylength exceeds the size of the fixed stack buffer used for the derived key (64 bytes), the key derivation will overflow the buffer. The overflow length is attacker-controlled. Also, if the salt parameter is not an OCTET STRING type this can lead to invalid or NULL pointer dereference. Exploiting this issue requires a user or application to process a maliciously craft...

rocky
5 дней назад

Important: openssl security update

oracle-oval
6 дней назад

ELSA-2026-50081: openssl security update (IMPORTANT)

EPSS

Процентиль: 1%
0.00011
Низкий

6.1 Medium

CVSS3

Уязвимость CVE-2025-11187