PT-2026-4941 · Openssl+5 · Openssl 3.3+12
Igor Ustinov
+1
·
Published
2025-01-01
·
Updated
2026-03-15
·
CVE-2025-15467
CVSS v2.0
10
High
| AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
OpenSSL versions 3.0 through 3.6
OpenSSL versions 3.0.19, 3.3.6, 3.4.4, 3.5.5, and 3.6.1 are not affected.
OpenSSL 1.1.1 and 1.0.2 are not affected.
Description
OpenSSL is vulnerable to a stack buffer overflow in the parsing of CMS AuthEnvelopedData messages with maliciously crafted AEAD parameters. An attacker can supply a crafted CMS message with an oversized Initialization Vector (IV) to trigger a stack-based out-of-bounds write before authentication or tag verification occurs. This vulnerability can lead to a denial of service (DoS) or potentially remote code execution (RCE). The FIPS modules in versions 3.6, 3.5, 3.4, 3.3, and 3.0 are not affected.
Recommendations
Update OpenSSL to version 3.0.19, 3.3.6, 3.4.4, 3.5.5, or 3.6.1.
Exploit
Fix
DoS
RCE
Memory Corruption
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Freebsd
Ibm Aix
Linuxmint
Openssl 3.0
Openssl 3.1
Openssl 3.2
Openssl 3.3
Openssl 3.4
Openssl 3.5
Openssl 3.6
Openssl
Rocky Linux
Ubuntu