PT-2026-4940 · Openssl · Openssl

Hamza

+3

·

Published

2025-01-01

·

Updated

2026-01-28

·

CVE-2025-11187

None

No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
Name of the Vulnerable Software and Affected Versions OpenSSL versions 3.4 through 3.6
Description A flaw exists in the processing of PKCS#12 files that use PBMAC1 for the MAC. Missing validation of PBMAC1 parameters can lead to a stack-based buffer overflow, invalid pointer, or NULL pointer dereference during MAC verification. This may cause a crash, leading to a denial of service. The buffer overflow could potentially enable code execution, depending on platform mitigations. Exploitation requires processing a maliciously crafted PKCS#12 file. The
keylength
parameter from the file is used without validation, and if it exceeds the size of the fixed stack buffer (64 bytes) used for the derived key, a buffer overflow occurs. The overflow length is attacker-controlled. Additionally, if the
salt
parameter is not an OCTET STRING type, it can lead to invalid or NULL pointer dereference.
Recommendations OpenSSL version 3.4 is vulnerable and should be updated. OpenSSL version 3.5 is vulnerable and should be updated. OpenSSL version 3.6 is vulnerable and should be updated.

DoS

NULL Pointer Dereference

Memory Corruption

Weakness Enumeration

Related Identifiers

CVE-2025-11187

Affected Products

Openssl