PT-2026-4949 · Unknown+6 · Openssl 3.4+11

Norbert Pócs

+1

·

Published

2025-01-01

·

Updated

2026-03-15

·

CVE-2025-69419

CVSS v3.1

7.4

High

AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Name of the Vulnerable Software and Affected Versions OpenSSL versions 1.1.1, 3.0, 3.3, 3.4, 3.5 and 3.6
Description A flaw exists in the handling of maliciously crafted PKCS#12 files when using the PKCS12 get friendlyname() API. Specifically, processing a PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code points can lead to a one-byte write before the allocated buffer. This out-of-bounds write can cause memory corruption, potentially resulting in a Denial of Service. The issue stems from an incorrect capacity calculation within the bmp to utf8() function during the UTF-16 to UTF-8 conversion process, specifically when handling BMP code points above U+07FF. The OPENSSL uni2utf8() function is involved in this conversion. The vulnerability is triggered when parsing attacker-controlled PKCS#12 files via the public PKCS12 get friendlyname() API. The FIPS modules in versions 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected.
Recommendations OpenSSL version 1.1.1: At the moment, there is no information about a newer version that contains a fix for this vulnerability. OpenSSL version 3.0: At the moment, there is no information about a newer version that contains a fix for this vulnerability. OpenSSL version 3.3: At the moment, there is no information about a newer version that contains a fix for this vulnerability. OpenSSL version 3.4: At the moment, there is no information about a newer version that contains a fix for this vulnerability. OpenSSL version 3.5: At the moment, there is no information about a newer version that contains a fix for this vulnerability. OpenSSL version 3.6: At the moment, there is no information about a newer version that contains a fix for this vulnerability.

DoS

Improper Check for Exceptional Conditions

Memory Corruption

Weakness Enumeration

Related Identifiers

ALSA-2026:1472
ALSA-2026:1473
ALSA-2026:3042
ALSA-2026:4472
BDU:2026-01217
BDU:2026-01219
CVE-2025-69419
ECHO-1956-F8C5-351F
MGASA-2026-0029
OPENSUSE-SU-2026:10237-1
OPENSUSE-SU-2026:20152-1
RHSA-2026:1472
RHSA-2026:1473
RHSA-2026:1496
RHSA-2026:1503
RHSA-2026:1519
RHSA-2026:1594
RHSA-2026:1733
RHSA-2026:2994
RHSA-2026:3042
RHSA-2026:3364
RHSA-2026:3437
RHSA-2026:4163
RHSA-2026:4214
RHSA-2026:4472
SUSE-SU-2026:0309-1
SUSE-SU-2026:0310-1
SUSE-SU-2026:0311-1
SUSE-SU-2026:0312-1
SUSE-SU-2026:0331-1
SUSE-SU-2026:0343-1
SUSE-SU-2026:0346-1
SUSE-SU-2026:0358-1
SUSE-SU-2026:0359-1
SUSE-SU-2026:0360-1
SUSE-SU-2026:20211-1
SUSE-SU-2026:20223-1
SUSE-SU-2026:20349-1
SUSE-SU-2026:20373-1
USN-7980-1
USN-7980-2

Affected Products

Freebsd
Ibm Aix
Linuxmint
Openssl 1.1.1
Openssl 3.0
Openssl 3.3
Openssl 3.4
Openssl 3.5
Openssl 3.6
Openssl
Rocky Linux
Ubuntu