NULL Pointer Dereference Affecting openssl-src package, versions <300.2.2+3.2.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.23% (62nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about NULL Pointer Dereference vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-OPENSSLSRC-6210215
  • published31 Jan 2024
  • disclosed22 Jan 2024
  • creditBahaa Naamneh

Introduced: 22 Jan 2024

CVE-2024-0727  (opens in a new tab)
CWE-476  (opens in a new tab)

How to fix?

Upgrade openssl-src to version 300.2.2+3.2.1 or higher.

Overview

openssl-src is a crate that contains the logic to build OpenSSL and is intended to be consumed by the openssl-sys crate.

Affected versions of this package are vulnerable to NULL Pointer Dereference when processing a maliciously formatted PKCS12 file. The vulnerability exists due to improper handling of optional ContentInfo fields, which can be set to null. An attacker can cause a denial of service by sending crafted input that leads to applications loading files in PKCS12 format from untrusted sources to terminate abruptly.

CVSS Scores

version 3.1