Stack-based Buffer Overflow Affecting openssl package, versions [3.4.0,3.4.4)[3.5.0,3.5.5)[3.6.0,3.6.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CONAN-OPENSSL-15123587
  • published28 Jan 2026
  • disclosed27 Jan 2026
  • creditStanislav Fort,Petr Šimeček,Hamza

Introduced: 27 Jan 2026

CVE-2025-11187  (opens in a new tab)
CWE-121  (opens in a new tab)

How to fix?

Upgrade openssl to version 3.4.4, 3.5.5, 3.6.1 or higher.

Overview

Affected versions of this package are vulnerable to Stack-based Buffer Overflow or null pointer dereference in pkcs12/p12_mutl.c‎. If a user can be convinced to process a malicious PKCS#12 file, malicious keylength or salt values can be used to cause a crash. Subsequently, in the case of overflowing the keylength, memory may be controlled in a way to enable code execution.

Versions prior to 3.4 are not vulnerable because they do not support PBMAC1 in PKCS#12.

CVSS Base Scores

version 4.0
version 3.1