Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out-of-bounds (OOB) write flaws.
When parsing a PKCS12 file, with a >= 1 GiB OCTET STRING (or BIT STRING) attribute on a SAFEBAG, via info() or info_as_hash(), a heap out-of-bounds write would be triggered with remote-code-execution potential (RCE) due to a signed integer overflow in the size calculation passed to Renew().
Metrics
Affected Vendors & Products
References
History
Mon, 18 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out of bound (OOB) write flaws. When parsing a PKCS12 file, with a >= 1 GiB OCTET STRING (or BIT STRING) attribute on a SAFEBAG, via info() or info_as_hash(), a heap-OOB-WRITE would be triggered which could have Remote Code Execution (RCE) potential. | Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out-of-bounds (OOB) write flaws. When parsing a PKCS12 file, with a >= 1 GiB OCTET STRING (or BIT STRING) attribute on a SAFEBAG, via info() or info_as_hash(), a heap out-of-bounds write would be triggered with remote-code-execution potential (RCE) due to a signed integer overflow in the size calculation passed to Renew(). |
| Title | Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out of bound (OOB) write flaws | Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out-of-bounds (OOB) write flaws |
Sun, 17 May 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sun, 17 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out of bound (OOB) write flaws. When parsing a PKCS12 file, with a >= 1 GiB OCTET STRING (or BIT STRING) attribute on a SAFEBAG, via info() or info_as_hash(), a heap-OOB-WRITE would be triggered which could have Remote Code Execution (RCE) potential. | |
| Title | Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out of bound (OOB) write flaws | |
| Weaknesses | CWE-787 | |
| References |
|
|
Status: PUBLISHED
Assigner: CPANSec
Published: 2026-05-17T18:43:05.863Z
Updated: 2026-05-18T00:08:32.838Z
Reserved: 2026-05-13T22:45:07.737Z
Link: CVE-2026-8507
No data.
Status : Received
Published: 2026-05-17T19:16:24.590
Modified: 2026-05-18T00:16:36.733
Link: CVE-2026-8507
No data.
ReportizFlow