OpenSSL PKCS12 Decoding crashes
Advisory ID | CVE Number | Date discovered | Severity | Advisory revision |
---|---|---|---|---|
STORM-2024-011 | CVE-2024-0727 | 01/25/2024 | low | v2 |
Vulnerability details
Processing a maliciously formatted PKCS12 file coming from untrusted source may lead OpenSSL to crash, leading to a potential Denial of Service attack
Impacted products
Products | Severity | Detail |
---|---|---|
Stormshield Network Security | low | SNS is impacted |
Revisions
Version | Date | Description |
---|---|---|
v1 | 04/10/2024 | Initial release |
v2 | 04/15/2024 | Update and disclosed |
Stormshield Network Security |
CVSS v3.1 Overall Score: 1.3 |
Analysis |
Impacted version |
A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue.
|
|
Workaround solution |
Solution |
There is no workaround solution. |
The following SNS versions will fix this vulnerability:
|
Attack Vector | Attack Complexity | Privileges Required | User Interaction | Scope | Confidentiality Impact | Integrity Impact | Availability impact |
---|---|---|---|---|---|---|---|
Network | High | High | None | Unchanged | None | None | Low |
CVSS Base score: 2.2 | CVSS Vector: (AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L) |
Exploit Code Maturity | Remediation Level | Report Confidence |
---|---|---|
Proof of concept code | Official fix | Reasonable |
CVSS Temporal score: 1.9 | CVSS Vector: (AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:R) |
Confidentiality Requirement | Integrity Requirement | Availability Requirement |
---|---|---|
Low | Low | Low |
CVSS Environmental score: 1.3 | CVSS Vector: (AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:R/CR:L/IR:L/AR:L/MAV:X/MAC:X/MPR:X/MUI:X/MS:X/MC:X/MI:X/MA:X) |