Количество 18
Количество 18
GHSA-wvhq-3h88-rf6g
Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolcha...
CVE-2025-15467
Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on pl...
CVE-2025-15467
Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on pl...
CVE-2025-15467
Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on pl
CVE-2025-15467
Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message ...
BDU:2026-00890
Уязвимость обработчика CMS-сообщений криптографической библиотеки OpenSSL, позволяющая нарушителю выполнить произвольный код
SUSE-SU-2026:0312-1
Security update for openssl-3
SUSE-SU-2026:0311-1
Security update for openssl-3
SUSE-SU-2026:0310-1
Security update for openssl-3
SUSE-SU-2026:0309-1
Security update for openssl-3
openSUSE-SU-2026:20152-1
Security update for openssl-3
RLSA-2026:1473
Important: openssl security update
RLSA-2026:1472
Important: openssl security update
ELSA-2026-50081
ELSA-2026-50081: openssl security update (IMPORTANT)
ELSA-2026-50080
ELSA-2026-50080: openssl security update (IMPORTANT)
ELSA-2026-50075
ELSA-2026-50075: openssl security update (IMPORTANT)
ELSA-2026-1473
ELSA-2026-1473: openssl security update (IMPORTANT)
ELSA-2026-1472
ELSA-2026-1472: openssl security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-wvhq-3h88-rf6g Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolcha... | CVSS3: 9.8 | 1% Низкий | около 2 месяцев назад | |
CVE-2025-15467 Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on pl... | CVSS3: 9.8 | 1% Низкий | около 2 месяцев назад | |
CVE-2025-15467 Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on pl... | CVSS3: 9.8 | 1% Низкий | около 2 месяцев назад | |
CVE-2025-15467 Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on pl | CVSS3: 9.8 | 1% Низкий | около 2 месяцев назад | |
CVE-2025-15467 Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message ... | CVSS3: 9.8 | 1% Низкий | около 2 месяцев назад | |
BDU:2026-00890 Уязвимость обработчика CMS-сообщений криптографической библиотеки OpenSSL, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 1% Низкий | около 2 месяцев назад | |
SUSE-SU-2026:0312-1 Security update for openssl-3 | около 2 месяцев назад | |||
SUSE-SU-2026:0311-1 Security update for openssl-3 | около 2 месяцев назад | |||
SUSE-SU-2026:0310-1 Security update for openssl-3 | около 2 месяцев назад | |||
SUSE-SU-2026:0309-1 Security update for openssl-3 | около 2 месяцев назад | |||
openSUSE-SU-2026:20152-1 Security update for openssl-3 | около 2 месяцев назад | |||
RLSA-2026:1473 Important: openssl security update | около 2 месяцев назад | |||
RLSA-2026:1472 Important: openssl security update | около 2 месяцев назад | |||
ELSA-2026-50081 ELSA-2026-50081: openssl security update (IMPORTANT) | около 2 месяцев назад | |||
ELSA-2026-50080 ELSA-2026-50080: openssl security update (IMPORTANT) | около 2 месяцев назад | |||
ELSA-2026-50075 ELSA-2026-50075: openssl security update (IMPORTANT) | около 2 месяцев назад | |||
ELSA-2026-1473 ELSA-2026-1473: openssl security update (IMPORTANT) | около 2 месяцев назад | |||
ELSA-2026-1472 ELSA-2026-1472: openssl security update (IMPORTANT) | около 2 месяцев назад |
Уязвимостей на страницу