OpenSSL CVE-2016-2105 Buffer Overflow Vulnerability

description-logoDescription

Severity: LowAn overflow can occur in the EVP_EncodeUpdate() function which is used forBase64 encoding of binary data. If an attacker is able to supply very largeamounts of input data then a length check can overflow resulting in a heapcorruption.Internally to OpenSSL the EVP_EncodeUpdate() function is primarly used by thePEM_write_bio* family of functions. These are mainly used within the OpenSSLcommand line applications. These internal uses are not considered vulnerablebecause all calls are bounded with length checks so no overflow is possible.User applications that call these APIs directly with large amounts of untrusteddata may be vulnerable. (Note: Initial analysis suggested that thePEM_write_bio* were vulnerable, and this is reflected in the patch commitmessage. This is no longer believed to be the case).OpenSSL 1.0.2 users should upgrade to 1.0.2hOpenSSL 1.0.1 users should upgrade to 1.0.1tThis issue was reported to OpenSSL on 3rd March 2016 by Guido Vranken. Thefix was developed by Matt Caswell of the OpenSSL development team.

affected-products-logoAffected Applications

OpenSSL

CVE References

CVE-2016-2105