
A security update has been released by maintainers of OpenSSL, the cryptographic library, addressing about a dozen vulnerabilities, including logic errors and memory corruption, among others.
The most alarming discovery is CVE-2025-15467, a vulnerability rooted in the way OpenSSL processes Cryptographic Message Syntax (CMS) structures. Specifically, the flaw affects the handling of AuthEnvelopedData messages that use AEAD ciphers such as AES-GCM.
This security bug is a high-severity stack buffer overflow that could potentially allow remote attackers to execute code on vulnerable systems.
The advisory details a number of challenges related to several components, such as KCS#12 P handling, CMS processing, and TLS 1.3 certificate mitigation.
When the system attempts to transfer the initialization vector into a fixed-size buffer, the problem occurs. The warning specifies that processing the C MS AuthEnvelopedData message containing AEAD parameters can trigger a stack buffer overflow.
Failure by the library to verify that the length is appropriate for the target allows an attacker to force a write across the stack bounds . A stack buffer overflow can then cause a crash, resulting in a denial of service or, potentially, remote code execution, with very serious consequences.
Essentially, this can happen before the system even verifies authentication credentials. “Since the overflow occurs before authentication, no valid key material is needed to trigger it.”
Several areas of OpenSSL, including the latest version of the 3.x series, are vulnerable to vulnerabilities. To minimize these risks, the administrators have released the following updates.
The update also addresses other bugs, fixing ten low-severity vulnerabilities that could lead to crashes or minor data integrity issues. The most significant of these include:
Users of previous versions, which include premium support (1.1.1 and 1.0.2), have dedicated patches for specific vulnerabilities.
Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.
