Логотип exploitDog
bind:CVE-2025-15467
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-15467

Количество 18

Количество 18

ubuntu логотип

CVE-2025-15467

около 2 месяцев назад

Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on pl...

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2025-15467

около 2 месяцев назад

Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on pl...

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2025-15467

около 2 месяцев назад

Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on pl

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2025-15467

около 2 месяцев назад

Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-wvhq-3h88-rf6g

около 2 месяцев назад

Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolcha...

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2026-00890

около 2 месяцев назад

Уязвимость обработчика CMS-сообщений криптографической библиотеки OpenSSL, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0312-1

около 2 месяцев назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0311-1

около 2 месяцев назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0310-1

около 2 месяцев назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0309-1

около 2 месяцев назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2026:20152-1

около 2 месяцев назад

Security update for openssl-3

EPSS: Низкий
rocky логотип

RLSA-2026:1473

около 2 месяцев назад

Important: openssl security update

EPSS: Низкий
rocky логотип

RLSA-2026:1472

около 2 месяцев назад

Important: openssl security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50081

около 2 месяцев назад

ELSA-2026-50081: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50080

около 2 месяцев назад

ELSA-2026-50080: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50075

около 2 месяцев назад

ELSA-2026-50075: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1473

около 2 месяцев назад

ELSA-2026-1473: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1472

около 2 месяцев назад

ELSA-2026-1472: openssl security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-15467

Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on pl...

CVSS3: 9.8
1%
Низкий
около 2 месяцев назад
redhat логотип
CVE-2025-15467

Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on pl...

CVSS3: 9.8
1%
Низкий
около 2 месяцев назад
nvd логотип
CVE-2025-15467

Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on pl

CVSS3: 9.8
1%
Низкий
около 2 месяцев назад
debian логотип
CVE-2025-15467

Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message ...

CVSS3: 9.8
1%
Низкий
около 2 месяцев назад
github логотип
GHSA-wvhq-3h88-rf6g

Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolcha...

CVSS3: 9.8
1%
Низкий
около 2 месяцев назад
fstec логотип
BDU:2026-00890

Уязвимость обработчика CMS-сообщений криптографической библиотеки OpenSSL, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
1%
Низкий
около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0312-1

Security update for openssl-3

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0311-1

Security update for openssl-3

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0310-1

Security update for openssl-3

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0309-1

Security update for openssl-3

около 2 месяцев назад
suse-cvrf логотип
openSUSE-SU-2026:20152-1

Security update for openssl-3

около 2 месяцев назад
rocky логотип
RLSA-2026:1473

Important: openssl security update

около 2 месяцев назад
rocky логотип
RLSA-2026:1472

Important: openssl security update

около 2 месяцев назад
oracle-oval логотип
ELSA-2026-50081

ELSA-2026-50081: openssl security update (IMPORTANT)

около 2 месяцев назад
oracle-oval логотип
ELSA-2026-50080

ELSA-2026-50080: openssl security update (IMPORTANT)

около 2 месяцев назад
oracle-oval логотип
ELSA-2026-50075

ELSA-2026-50075: openssl security update (IMPORTANT)

около 2 месяцев назад
oracle-oval логотип
ELSA-2026-1473

ELSA-2026-1473: openssl security update (IMPORTANT)

около 2 месяцев назад
oracle-oval логотип
ELSA-2026-1472

ELSA-2026-1472: openssl security update (IMPORTANT)

около 2 месяцев назад

Уязвимостей на страницу