Impact
osslsigncode, a tool that signs and timestamps PE files, contains an integer underflow in its page-hash calculation code when a PE file’s SizeOfHeaders exceeds its SectionAlignment. The faulty subtraction produces a very large buffer size, causing the program to read beyond the allocated memory and crash. While the outcome is a denial of service for the signing or verifying process, the out-of-bounds read could potentially leak heap data in certain scenarios.
Affected Systems
The flaw affects the osslsigncode project produced by the developer mtrojnar, specifically any release version 2.12 or earlier. Version 2.13 and later incorporate a patch that removes the underflow.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity. No EPSS value is available, and the issue is not listed in the CISA KEV catalog, suggesting it is not a widely exploited vulnerability at present. An attacker can trigger the crash by providing a crafted PE file that uses page hashing (the –ph option) during signing or by feeding a signed file containing page hashes to the verifier. Successful exploitation requires access to the osslsigncode invocation, so the threat is primarily local or arises when the tool is run on untrusted files.
OpenCVE Enrichment