CVE-2025-11187

Source
https://cve.org/CVERecord?id=CVE-2025-11187
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-11187.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-11187
Downstream
Related
Published
2026-01-27T16:16:14.093Z
Modified
2026-01-30T22:52:18.754663Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H CVSS Calculator
Summary
[none]
Details

Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification.

Impact summary: The stack buffer overflow or NULL pointer dereference may cause a crash leading to Denial of Service for an application that parses untrusted PKCS#12 files. The buffer overflow may also potentially enable code execution depending on platform mitigations.

When verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2 salt and keylength parameters from the file are used without validation. If the value of keylength exceeds the size of the fixed stack buffer used for the derived key (64 bytes), the key derivation will overflow the buffer. The overflow length is attacker-controlled. Also, if the salt parameter is not an OCTET STRING type this can lead to invalid or NULL pointer dereference.

Exploiting this issue requires a user or application to process a maliciously crafted PKCS#12 file. It is uncommon to accept untrusted PKCS#12 files in applications as they are usually used to store private keys which are trusted by definition. For this reason the issue was assessed as Moderate severity.

The FIPS modules in 3.6, 3.5 and 3.4 are not affected by this issue, as PKCS#12 processing is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5 and 3.4 are vulnerable to this issue.

OpenSSL 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue as they do not support PBMAC1 in PKCS#12.

References

Affected packages

Git / github.com/openssl/openssl

Affected ranges

Type
GIT
Repo
https://github.com/openssl/openssl
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Fixed

Affected versions

3.*

3.4-POST-CLANG-FORMAT-WEBKIT
3.4-PRE-CLANG-FORMAT-WEBKIT
3.5-POST-CLANG-FORMAT-WEBKIT
3.5-PRE-CLANG-FORMAT-WEBKIT
3.6-POST-CLANG-FORMAT-WEBKIT
3.6-PRE-CLANG-FORMAT-WEBKIT

Other

BEFORE_engine
OpenSSL_0_9_1c
OpenSSL_0_9_2b
OpenSSL_0_9_3
OpenSSL_0_9_3a
OpenSSL_0_9_3beta2
OpenSSL_0_9_4
OpenSSL_0_9_5a
OpenSSL_0_9_5a-beta1
OpenSSL_0_9_5a-beta2
OpenSSL_0_9_5beta1
OpenSSL_0_9_5beta2
OpenSSL_0_9_6-beta3
OpenSSL_1_1_0-pre1
OpenSSL_1_1_0-pre2
OpenSSL_1_1_0-pre3
OpenSSL_1_1_0-pre4
OpenSSL_1_1_0-pre5
OpenSSL_1_1_0-pre6
OpenSSL_1_1_1
OpenSSL_1_1_1-pre1
OpenSSL_1_1_1-pre2
OpenSSL_1_1_1-pre3
OpenSSL_1_1_1-pre4
OpenSSL_1_1_1-pre5
OpenSSL_1_1_1-pre6
OpenSSL_1_1_1-pre7
OpenSSL_1_1_1-pre8
OpenSSL_1_1_1-pre9
master-post-auto-reformat
master-post-reformat
master-pre-auto-reformat
master-pre-reformat

openssl-3.*

openssl-3.0.0-alpha1
openssl-3.0.0-alpha10
openssl-3.0.0-alpha11
openssl-3.0.0-alpha12
openssl-3.0.0-alpha13
openssl-3.0.0-alpha14
openssl-3.0.0-alpha15
openssl-3.0.0-alpha16
openssl-3.0.0-alpha17
openssl-3.0.0-alpha2
openssl-3.0.0-alpha3
openssl-3.0.0-alpha4
openssl-3.0.0-alpha5
openssl-3.0.0-alpha6
openssl-3.0.0-alpha7
openssl-3.0.0-alpha8
openssl-3.0.0-alpha9
openssl-3.0.0-beta1
openssl-3.0.0-beta2
openssl-3.2.0-alpha1
openssl-3.2.0-alpha2
openssl-3.4.0
openssl-3.4.0-alpha1
openssl-3.4.0-beta1
openssl-3.4.1
openssl-3.4.2
openssl-3.4.3
openssl-3.5.0
openssl-3.5.0-alpha1
openssl-3.5.0-beta1
openssl-3.5.1
openssl-3.5.2
openssl-3.5.3
openssl-3.5.4
openssl-3.6.0
openssl-3.6.0-alpha1
openssl-3.6.0-beta1

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-11187.json"

vanir_signatures

[
    {
        "source": "https://github.com/openssl/openssl/commit/8caf359d6e46fb413e8f5f0df765d2e8a51df4e8",
        "digest": {
            "length": 1018.0,
            "function_hash": "323369777129941560039870760343903730199"
        },
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Function",
        "target": {
            "file": "crypto/pkcs12/p12_mutl.c",
            "function": "PBMAC1_PBKDF2_HMAC"
        },
        "id": "CVE-2025-11187-196887cb"
    },
    {
        "source": "https://github.com/openssl/openssl/commit/e1079bc17ed93ff16f6b86f33a2fe3336e78817e",
        "digest": {
            "length": 1018.0,
            "function_hash": "323369777129941560039870760343903730199"
        },
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Function",
        "target": {
            "file": "crypto/pkcs12/p12_mutl.c",
            "function": "PBMAC1_PBKDF2_HMAC"
        },
        "id": "CVE-2025-11187-3f625072"
    },
    {
        "source": "https://github.com/openssl/openssl/commit/e1079bc17ed93ff16f6b86f33a2fe3336e78817e",
        "digest": {
            "line_hashes": [
                "163358040323313618289697049812862119368",
                "113422112202866210310933896877790971018",
                "189090193609318997984188165177189167962",
                "164741093182620992286724068289220911374",
                "324980449716791633706520825728857049136",
                "213963862446218750557812807141860990457",
                "98657337680482779355431210568621908858",
                "173389769096292109227363313358040809197"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Line",
        "target": {
            "file": "crypto/pkcs12/p12_mutl.c"
        },
        "id": "CVE-2025-11187-8ba1fcad"
    },
    {
        "source": "https://github.com/openssl/openssl/commit/205e3a55e16e4bd08c12fdbd3416ab829c0f6206",
        "digest": {
            "line_hashes": [
                "163358040323313618289697049812862119368",
                "113422112202866210310933896877790971018",
                "189090193609318997984188165177189167962",
                "164741093182620992286724068289220911374",
                "324980449716791633706520825728857049136",
                "213963862446218750557812807141860990457",
                "98657337680482779355431210568621908858",
                "173389769096292109227363313358040809197"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Line",
        "target": {
            "file": "crypto/pkcs12/p12_mutl.c"
        },
        "id": "CVE-2025-11187-9f4651e4"
    },
    {
        "source": "https://github.com/openssl/openssl/commit/8caf359d6e46fb413e8f5f0df765d2e8a51df4e8",
        "digest": {
            "line_hashes": [
                "163358040323313618289697049812862119368",
                "113422112202866210310933896877790971018",
                "189090193609318997984188165177189167962",
                "164741093182620992286724068289220911374",
                "324980449716791633706520825728857049136",
                "213963862446218750557812807141860990457",
                "98657337680482779355431210568621908858",
                "173389769096292109227363313358040809197"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Line",
        "target": {
            "file": "crypto/pkcs12/p12_mutl.c"
        },
        "id": "CVE-2025-11187-b68ed894"
    },
    {
        "source": "https://github.com/openssl/openssl/commit/205e3a55e16e4bd08c12fdbd3416ab829c0f6206",
        "digest": {
            "length": 1018.0,
            "function_hash": "323369777129941560039870760343903730199"
        },
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Function",
        "target": {
            "file": "crypto/pkcs12/p12_mutl.c",
            "function": "PBMAC1_PBKDF2_HMAC"
        },
        "id": "CVE-2025-11187-e13fa25c"
    }
]