Логотип exploitDog
bind:"GHSA-hpc7-gcqm-58fv" OR bind:"CVE-2025-11187"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-hpc7-gcqm-58fv" OR bind:"CVE-2025-11187"

Количество 14

Количество 14

github логотип

GHSA-hpc7-gcqm-58fv

около 2 месяцев назад

Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification. Impact summary: The stack buffer overflow or NULL pointer dereference may cause a crash leading to Denial of Service for an application that parses untrusted PKCS#12 files. The buffer overflow may also potentially enable code execution depending on platform mitigations. When verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2 salt and keylength parameters from the file are used without validation. If the value of keylength exceeds the size of the fixed stack buffer used for the derived key (64 bytes), the key derivation will overflow the buffer. The overflow length is attacker-controlled. Also, if the salt parameter is not an OCTET STRING type this can lead to invalid or NULL pointer dereference. Exploiting this issue requires a user or application to process a maliciously craft...

CVSS3: 6.1
EPSS: Низкий
ubuntu логотип

CVE-2025-11187

около 2 месяцев назад

Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification. Impact summary: The stack buffer overflow or NULL pointer dereference may cause a crash leading to Denial of Service for an application that parses untrusted PKCS#12 files. The buffer overflow may also potentially enable code execution depending on platform mitigations. When verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2 salt and keylength parameters from the file are used without validation. If the value of keylength exceeds the size of the fixed stack buffer used for the derived key (64 bytes), the key derivation will overflow the buffer. The overflow length is attacker-controlled. Also, if the salt parameter is not an OCTET STRING type this can lead to invalid or NULL pointer dereference. Exploiting this issue requires a user or application to process a maliciously crafted ...

CVSS3: 6.1
EPSS: Низкий
redhat логотип

CVE-2025-11187

около 2 месяцев назад

Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification. Impact summary: The stack buffer overflow or NULL pointer dereference may cause a crash leading to Denial of Service for an application that parses untrusted PKCS#12 files. The buffer overflow may also potentially enable code execution depending on platform mitigations. When verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2 salt and keylength parameters from the file are used without validation. If the value of keylength exceeds the size of the fixed stack buffer used for the derived key (64 bytes), the key derivation will overflow the buffer. The overflow length is attacker-controlled. Also, if the salt parameter is not an OCTET STRING type this can lead to invalid or NULL pointer dereference. Exploiting this issue requires a user or application to process a maliciously crafted ...

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2025-11187

около 2 месяцев назад

Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification. Impact summary: The stack buffer overflow or NULL pointer dereference may cause a crash leading to Denial of Service for an application that parses untrusted PKCS#12 files. The buffer overflow may also potentially enable code execution depending on platform mitigations. When verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2 salt and keylength parameters from the file are used without validation. If the value of keylength exceeds the size of the fixed stack buffer used for the derived key (64 bytes), the key derivation will overflow the buffer. The overflow length is attacker-controlled. Also, if the salt parameter is not an OCTET STRING type this can lead to invalid or NULL pointer dereference. Exploiting this issue requires a user or application to process a maliciously crafted

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2025-11187

около 2 месяцев назад

Issue summary: PBMAC1 parameters in PKCS#12 files are missing validati ...

CVSS3: 6.1
EPSS: Низкий
fstec логотип

BDU:2026-01223

7 месяцев назад

Уязвимость файлов формата PKCS#12 библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании или выпонить произвольный код

CVSS3: 6.1
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2026:20152-1

около 2 месяцев назад

Security update for openssl-3

EPSS: Низкий
rocky логотип

RLSA-2026:1473

около 2 месяцев назад

Important: openssl security update

EPSS: Низкий
rocky логотип

RLSA-2026:1472

около 2 месяцев назад

Important: openssl security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50081

около 2 месяцев назад

ELSA-2026-50081: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50080

около 2 месяцев назад

ELSA-2026-50080: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50075

около 2 месяцев назад

ELSA-2026-50075: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1473

около 2 месяцев назад

ELSA-2026-1473: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1472

около 2 месяцев назад

ELSA-2026-1472: openssl security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-hpc7-gcqm-58fv

Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification. Impact summary: The stack buffer overflow or NULL pointer dereference may cause a crash leading to Denial of Service for an application that parses untrusted PKCS#12 files. The buffer overflow may also potentially enable code execution depending on platform mitigations. When verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2 salt and keylength parameters from the file are used without validation. If the value of keylength exceeds the size of the fixed stack buffer used for the derived key (64 bytes), the key derivation will overflow the buffer. The overflow length is attacker-controlled. Also, if the salt parameter is not an OCTET STRING type this can lead to invalid or NULL pointer dereference. Exploiting this issue requires a user or application to process a maliciously craft...

CVSS3: 6.1
0%
Низкий
около 2 месяцев назад
ubuntu логотип
CVE-2025-11187

Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification. Impact summary: The stack buffer overflow or NULL pointer dereference may cause a crash leading to Denial of Service for an application that parses untrusted PKCS#12 files. The buffer overflow may also potentially enable code execution depending on platform mitigations. When verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2 salt and keylength parameters from the file are used without validation. If the value of keylength exceeds the size of the fixed stack buffer used for the derived key (64 bytes), the key derivation will overflow the buffer. The overflow length is attacker-controlled. Also, if the salt parameter is not an OCTET STRING type this can lead to invalid or NULL pointer dereference. Exploiting this issue requires a user or application to process a maliciously crafted ...

CVSS3: 6.1
0%
Низкий
около 2 месяцев назад
redhat логотип
CVE-2025-11187

Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification. Impact summary: The stack buffer overflow or NULL pointer dereference may cause a crash leading to Denial of Service for an application that parses untrusted PKCS#12 files. The buffer overflow may also potentially enable code execution depending on platform mitigations. When verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2 salt and keylength parameters from the file are used without validation. If the value of keylength exceeds the size of the fixed stack buffer used for the derived key (64 bytes), the key derivation will overflow the buffer. The overflow length is attacker-controlled. Also, if the salt parameter is not an OCTET STRING type this can lead to invalid or NULL pointer dereference. Exploiting this issue requires a user or application to process a maliciously crafted ...

CVSS3: 6.1
0%
Низкий
около 2 месяцев назад
nvd логотип
CVE-2025-11187

Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification. Impact summary: The stack buffer overflow or NULL pointer dereference may cause a crash leading to Denial of Service for an application that parses untrusted PKCS#12 files. The buffer overflow may also potentially enable code execution depending on platform mitigations. When verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2 salt and keylength parameters from the file are used without validation. If the value of keylength exceeds the size of the fixed stack buffer used for the derived key (64 bytes), the key derivation will overflow the buffer. The overflow length is attacker-controlled. Also, if the salt parameter is not an OCTET STRING type this can lead to invalid or NULL pointer dereference. Exploiting this issue requires a user or application to process a maliciously crafted

CVSS3: 6.1
0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2025-11187

Issue summary: PBMAC1 parameters in PKCS#12 files are missing validati ...

CVSS3: 6.1
0%
Низкий
около 2 месяцев назад
fstec логотип
BDU:2026-01223

Уязвимость файлов формата PKCS#12 библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании или выпонить произвольный код

CVSS3: 6.1
0%
Низкий
7 месяцев назад
suse-cvrf логотип
openSUSE-SU-2026:20152-1

Security update for openssl-3

около 2 месяцев назад
rocky логотип
RLSA-2026:1473

Important: openssl security update

около 2 месяцев назад
rocky логотип
RLSA-2026:1472

Important: openssl security update

около 2 месяцев назад
oracle-oval логотип
ELSA-2026-50081

ELSA-2026-50081: openssl security update (IMPORTANT)

около 2 месяцев назад
oracle-oval логотип
ELSA-2026-50080

ELSA-2026-50080: openssl security update (IMPORTANT)

около 2 месяцев назад
oracle-oval логотип
ELSA-2026-50075

ELSA-2026-50075: openssl security update (IMPORTANT)

около 2 месяцев назад
oracle-oval логотип
ELSA-2026-1473

ELSA-2026-1473: openssl security update (IMPORTANT)

около 2 месяцев назад
oracle-oval логотип
ELSA-2026-1472

ELSA-2026-1472: openssl security update (IMPORTANT)

около 2 месяцев назад

Уязвимостей на страницу