Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-69420

Опубликовано: 27 янв. 2026
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS3: 7.5

Описание

Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial...

РелизСтатусПримечание
devel

not-affected

code not compiled
esm-apps/bionic

not-affected

code not compiled
esm-apps/xenial

not-affected

code not compiled
esm-infra/focal

not-affected

code not compiled
jammy

not-affected

code not compiled
noble

not-affected

code not compiled
plucky

ignored

end of life, was needs-triage
questing

not-affected

code not compiled
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

not-affected

uses system openssl
esm-apps/bionic

needs-triage

esm-apps/focal

not-affected

uses system openssl
esm-apps/jammy

needed

esm-apps/noble

not-affected

uses system openssl
esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

not-affected

uses system openssl
jammy

needed

noble

not-affected

uses system openssl
plucky

not-affected

uses system openssl

Показывать по

РелизСтатусПримечание
devel

needed

esm-infra-legacy/trusty

not-affected

1.1.1+ only
esm-infra/bionic

released

1.1.1-1ubuntu2.1~18.04.23+esm7
esm-infra/focal

released

1.1.1f-1ubuntu2.24+esm2
esm-infra/xenial

not-affected

1.1.1+ only
fips-preview/jammy

needed

fips-updates/bionic

needed

fips-updates/focal

needed

fips-updates/jammy

needed

fips-updates/xenial

not-affected

1.1.1+ only

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/bionic

not-affected

1.1.1+ only
jammy

DNE

noble

DNE

plucky

DNE

questing

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 21%
0.0007
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
8 дней назад

Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial

CVSS3: 7.5
debian
8 дней назад

Issue summary: A type confusion vulnerability exists in the TimeStamp ...

CVSS3: 7.5
github
8 дней назад

Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Den...

suse-cvrf
7 дней назад

Security update for openssl-1_0_0

suse-cvrf
7 дней назад

Security update for openssl-1_0_0

EPSS

Процентиль: 21%
0.0007
Низкий

7.5 High

CVSS3