OpenSSL.SM2.Decryption.sm2_plaintext_size.Buffer.Overflow

description-logoDescription

This indicates an attack attempt to exploit a Buffer Overflow Vulnerability in OpenSSL Project OpenSSL.
The vulnerability is due to miscalculation of the outlen parameter used by EVP_PKEY_decrypt when decrypting SM2 encrypted data. A remote attacker could exploit the vulnerability by sending crafted packets to an application using OpenSSL API for SM2 decryption. Successful exploitation could result in denial of service conditions on the affected service.

affected-products-logoAffected Products

OpenSSL Project OpenSSL prior to 1.1.1l

Impact logoImpact

Denial of Service: Remote attackers can crash vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://www.openssl.org/news/secadv/20210824.txt

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2021-10-04 18.169 Default_action:pass:drop
2021-09-23 18.164