• CVE-2024-0727

发布时间: 2024年2月8日

修改时间: 2024年10月31日

概要

Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSLto crash leading to a potential Denial of Service attackImpact summary: Applications loading files in the PKCS12 format from untrustedsources might terminate abruptly.A file in PKCS12 format can contain certificates and keys and may come from anuntrusted source. The PKCS12 specification allows certain fields to be NULL, butOpenSSL does not correctly check for this case. This can lead to a NULL pointerdereference that results in OpenSSL crashing. If an application processes PKCS12files from an untrusted source using the OpenSSL APIs then that application willbe vulnerable to this issue.OpenSSL APIs that are vulnerable to this are: PKCS12_parse(),PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes()and PKCS12_newpass().We have also fixed a similar issue in SMIME_write_PKCS7(). However since thisfunction is related to writing data we do not consider it security significant.The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.

CVSS v3 指标

NVD openEuler
Confidentiality None None
Attack Vector Local Local
CVSS评分 5.5 5.5
Attack Complexity Low Low
Privileges Required None None
Scope Unchanged Unchanged
Integrity None None
User Interaction Required Required
Availability High High

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-3004 openssl security update 2024年2月8日
KylinSec-SA-2024-1560 shim security update 2024年3月1日
KylinSec-SA-2024-4768 edk2 security update 2025年2月17日

影响产品

产品 状态
KY3.4-4A openssl Fixed
KY3.4-5A openssl Fixed
KY3.5.1 openssl Fixed
KY3.5.2 openssl Fixed