中危 PKCS12 解码崩溃 (CVE-2024-0727)

CVE编号

CVE-2024-0727

利用情况

暂无

补丁情况

官方补丁

披露时间

2024-01-26
漏洞描述
Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL
to crash leading to a potential Denial of Service attack

Impact summary: Applications loading files in the PKCS12 format from untrusted
sources might terminate abruptly.

A file in PKCS12 format can contain certificates and keys and may come from an
untrusted source. The PKCS12 specification allows certain fields to be NULL, but
OpenSSL does not correctly check for this case. This can lead to a NULL pointer
dereference that results in OpenSSL crashing. If an application processes PKCS12
files from an untrusted source using the OpenSSL APIs then that application will
be vulnerable to this issue.

OpenSSL APIs that are vulnerable to this are: PKCS12_parse(),
PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes()
and PKCS12_newpass().

We have also fixed a similar issue in SMIME_write_PKCS7(). However since this
function is related to writing data we do not consider it security significant.

The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 openssl openssl * From
(including)
1.0.2
Up to
(excluding)
1.0.2zj
运行在以下环境
应用 openssl openssl * From
(including)
1.1.1
Up to
(excluding)
1.1.1x
运行在以下环境
应用 openssl openssl * From
(including)
3.0.0
Up to
(excluding)
3.0.13
运行在以下环境
应用 openssl openssl * From
(including)
3.1.0
Up to
(excluding)
3.1.5
运行在以下环境
应用 openssl openssl 3.2.0 -
运行在以下环境
系统 alpine_3.17 openssl * Up to
(excluding)
3.0.12-r4
运行在以下环境
系统 alpine_3.18 openssl * Up to
(excluding)
3.1.4-r5
运行在以下环境
系统 alpine_3.19 openssl * Up to
(excluding)
3.1.4-r5
阿里云评分
5.0
  • 攻击路径
    本地
  • 攻击复杂度
    困难
  • 权限要求
    管控权限
  • 影响范围
    有限影响
  • EXP成熟度
    未验证
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    无影响
  • 全网数量
    N/A
CWE-ID 漏洞类型
NVD-CWE-noinfo
阿里云安全产品覆盖情况