First published: Wed Jan 25 2023(Updated: )
An invalid pointer dereference on read can be triggered when an application tries to load malformed PKCS7 data with the d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions. The result of the dereference is an application crash which could lead to a denial of service attack. The TLS implementation in OpenSSL does not call this function however third party applications might call these functions on untrusted data.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2164497 is high due to its potential to cause application crashes and denial of service.
To fix REDHAT-BUG-2164497, update to the latest patched version of OpenSSL that addresses this vulnerability.
Applications using OpenSSL functions such as d2i_PKCS7(), d2i_PKCS7_bio(), or d2i_PKCS7_fp() with malformed PKCS7 data are affected by REDHAT-BUG-2164497.
REDHAT-BUG-2164497 affects the handling of malformed PKCS7 data within OpenSSL, leading to an invalid pointer dereference.
Yes, REDHAT-BUG-2164497 can potentially be exploited remotely if an attacker can send malformed PKCS7 data to an affected application.