PT-2026-4941 · Openssl+6 · Openssl 3.2+13

Igor Ustinov

+1

·

Published

2025-01-01

·

Updated

2026-05-08

·

CVE-2025-15467

CVSS v2.0

10

High

VectorAV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions OpenSSL version 3.0 OpenSSL version 3.3 OpenSSL version 3.4 OpenSSL version 3.5 OpenSSL version 3.6
Description Parsing CMS AuthEnvelopedData or EnvelopedData messages with maliciously crafted AEAD (Authenticated Encryption with Associated Data) parameters can trigger a stack buffer overflow. When processing CMS structures using AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying if its length fits the destination. This allows an attacker to provide a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services parsing untrusted CMS or PKCS#7 content, such as S/MIME, are affected. Since the overflow occurs prior to authentication, no valid key material is required to trigger the issue, which may lead to a crash causing Denial of Service or potentially remote code execution.
Recommendations Update OpenSSL version 3.0 to 3.0.19 Update OpenSSL version 3.3 to 3.3.6 Update OpenSSL version 3.4 to 3.4.4 Update OpenSSL version 3.5 to 3.5.5 Update OpenSSL version 3.6 to 3.6.1

Exploit

Fix

DoS

RCE

Memory Corruption

Weakness Enumeration

Related Identifiers

ALSA-2026:1472
ALSA-2026:1473
AZL-75791
AZL-75908
BDU:2026-00890
CVE-2025-15467
ECHO-DECB-8594-A95C
JLSEC-2026-256
MGASA-2026-0029
OESA-2026-1310
OESA-2026-1311
OESA-2026-1312
OPENSUSE-SU-2026:10237-1
OPENSUSE-SU-2026:20152-1
OPENSUSE-SU-2026:20673-1
RHSA-2026:1472
RHSA-2026:1473
RHSA-2026:1496
RHSA-2026:1503
RHSA-2026:1519
RHSA-2026:1594
RHSA-2026:1733
RHSA-2026:7261
SUSE-SU-2026:0309-1
SUSE-SU-2026:0310-1
SUSE-SU-2026:0311-1
SUSE-SU-2026:0312-1
SUSE-SU-2026:20211-1
SUSE-SU-2026:20223-1
SUSE-SU-2026:20349-1
SUSE-SU-2026:20373-1
SUSE-SU-2026:20542-1
SUSE-SU-2026:20607-1
USN-7980-1

Affected Products

Freebsd
Ibm Aix
Linuxmint
Openssl 3.0
Openssl 3.1
Openssl 3.2
Openssl 3.3
Openssl 3.4
Openssl 3.5
Openssl 3.6
Openssl
Red Os
Rocky Linux
Ubuntu