First published: Fri Sep 24 2021(Updated: )
x509_constraints_parse_mailbox in lib/libcrypto/x509/x509_constraints.c in LibreSSL through 3.4.0 has a stack-based buffer over-read. When the input exceeds DOMAIN_PART_MAX_LEN, the buffer lacks '\0' termination.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openbsd Libressl | <=3.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-41581.
The severity of CVE-2021-41581 is medium with a severity value of 5.5.
The affected software is Openbsd Libressl up to and including version 3.4.0.
CVE-2021-41581 is a stack-based buffer over-read vulnerability in x509_constraints_parse_mailbox function in Libressl.
Yes, the fix for CVE-2021-41581 is to update to a version of Libressl that is not affected by the vulnerability.