Memory Allocation with Excessive Size Value Affecting openssl package, versions [3.1.0,3.3.6)[3.4.0,3.4.4)[3.5.0,3.5.5)[3.6.0,3.6.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (19th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CONAN-OPENSSL-15124052
  • published28 Jan 2026
  • disclosed27 Jan 2026
  • creditTomas Dulka,Stanislav Fort

Introduced: 27 Jan 2026

CVE-2025-66199  (opens in a new tab)
CWE-789  (opens in a new tab)

How to fix?

Upgrade openssl to version 3.3.6, 3.4.4, 3.5.5, 3.6.1 or higher.

Overview

Affected versions of this package are vulnerable to Memory Allocation with Excessive Size Value. (up to 22 MiB) when allocating buffers for CompressedCertificate messages on a TLS 1.3 connection with certificate compression. An attacker can cause service degradation or resource exhaustion. The certificate length is not bounded by the max_cert_list setting, allowing large allocations and failure.

No memory corruption or information disclosure occurs.

Note: This only affects applications compiled wtih TLS 1.3 certificate compression (not OPENSSL_NO_COMP_ALG), with at least one compression algorithm (brotli, zlib, or zstd) available, and where the compression extension is negotiated.

CVSS Base Scores

version 4.0
version 3.1