Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
openCryptoki: Memory safety vulnerabilities in BER/DER decoders in asn1.c
Vulnerability Description
openCryptoki is a PKCS#11 library and provides tooling for Linux and AIX. In versions 3.26.0 and below, the BER/DER decoding functions in the shared common library (asn1.c) accept a raw pointer but no buffer length parameter, and trust attacker-controlled BER length fields without validating them against actual buffer boundaries. All primitive decoders are affected: ber_decode_INTEGER, ber_decode_SEQUENCE, ber_decode_OCTET_STRING, ber_decode_BIT_STRING, and ber_decode_CHOICE. Additionally, ber_decode_INTEGER can produce integer underflows when the encoded length is zero. An attacker supplying a malformed BER-encoded cryptographic object through PKCS#11 operations such as C_CreateObject or C_UnwrapKey, token loading from disk, or remote backend communication can trigger out-of-bounds reads. This affects all token backends (Soft, ICA, CCA, TPM, EP11, ICSF) since the vulnerable code is in the shared common library. A patch is available thorugh commit ed378f463ef73364c89feb0fc923f4dc867332a3.
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
Vulnerability Type
跨界内存读
Vulnerability Title
openCryptoki 安全漏洞
Vulnerability Description
openCryptoki是openCryptoki开源的一个适用于 Linux 的 PKCS#11 库和工具。 openCryptoki 3.26.0及之前版本存在安全漏洞,该漏洞源于共享公共库中的BER/DER解码函数信任攻击者控制的BER长度字段而未验证缓冲区边界,可能导致越界读取,攻击者可通过提供格式错误的BER编码加密对象触发此漏洞。
CVSS Information
N/A
Vulnerability Type
N/A