Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-69419

Опубликовано: 27 янв. 2026
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS3: 7.4

Описание

Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. Impact summary: The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service. The OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12 BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes, the helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16 source byte count as the destination buffer capacity to UTF8_putc(). For BMP code points above U+07FF, UTF-8 requires three bytes, but the forwarded capacity can be just two bytes. UTF8_putc() then returns -1, and this negative value is added to the output length without validation, causing the length to become negative. The subsequent trailing NUL byte is then written at a negative offset, caus...

РелизСтатусПримечание
devel

needs-triage

esm-apps/bionic

needs-triage

esm-apps/xenial

needs-triage

esm-infra/focal

needs-triage

jammy

needs-triage

noble

needs-triage

plucky

ignored

end of life, was needs-triage
questing

needs-triage

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

not-affected

uses system openssl
esm-apps/bionic

needs-triage

esm-apps/focal

not-affected

uses system openssl
esm-apps/jammy

needed

esm-apps/noble

not-affected

uses system openssl
esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

not-affected

uses system openssl
jammy

needed

noble

not-affected

uses system openssl
plucky

not-affected

uses system openssl

Показывать по

РелизСтатусПримечание
devel

released

3.5.5-1ubuntu1
esm-infra-legacy/trusty

not-affected

1.1.1+ only
esm-infra/bionic

released

1.1.1-1ubuntu2.1~18.04.23+esm7
esm-infra/focal

released

1.1.1f-1ubuntu2.24+esm2
esm-infra/xenial

not-affected

1.1.1+ only
fips-preview/jammy

needed

fips-updates/bionic

released

1.1.1-1ubuntu2.fips.2.1~18.04.23.7
fips-updates/focal

released

1.1.1f-1ubuntu2.fips.24.2
fips-updates/jammy

released

3.0.2-0ubuntu1.21+Fips1
fips-updates/xenial

not-affected

1.1.1+ only

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/bionic

not-affected

1.1.1+ only
jammy

DNE

noble

DNE

plucky

DNE

questing

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 19%
0.00061
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
redhat
около 2 месяцев назад

Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. Impact summary: The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service. The OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12 BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes, the helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16 source byte count as the destination buffer capacity to UTF8_putc(). For BMP code points above U+07FF, UTF-8 requires three bytes, but the forwarded capacity can be just two bytes. UTF8_putc() then returns -1, and this negative value is added to the output length without validation, causing the length to become negative. The subsequent trailing NUL byte is then written at a negative offset, caus...

CVSS3: 7.4
nvd
около 2 месяцев назад

Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. Impact summary: The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service. The OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12 BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes, the helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16 source byte count as the destination buffer capacity to UTF8_putc(). For BMP code points above U+07FF, UTF-8 requires three bytes, but the forwarded capacity can be just two bytes. UTF8_putc() then returns -1, and this negative value is added to the output length without validation, causing the length to become negative. The subsequent trailing NUL byte is then written at a negative offset, causi

CVSS3: 7.4
debian
около 2 месяцев назад

Issue summary: Calling PKCS12_get_friendlyname() function on a malicio ...

rocky
14 дней назад

Moderate: compat-openssl11 security update

CVSS3: 7.4
github
около 2 месяцев назад

Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. Impact summary: The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service. The OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12 BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes, the helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16 source byte count as the destination buffer capacity to UTF8_putc(). For BMP code points above U+07FF, UTF-8 requires three bytes, but the forwarded capacity can be just two bytes. UTF8_putc() then returns -1, and this negative value is added to the output length without validation, causing the length to become negative. The subsequent trailing NUL byte is then written at a negative offset, ca...

EPSS

Процентиль: 19%
0.00061
Низкий

7.4 High

CVSS3