Description
Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out-of-bounds (OOB) write flaws.

When parsing a PKCS12 file, with a >= 1 GiB OCTET STRING (or BIT STRING) attribute on a SAFEBAG, via info() or info_as_hash(), a heap out-of-bounds write would be triggered with remote-code-execution potential (RCE) due to a signed integer overflow in the size calculation passed to Renew().
Published: 2026-05-17
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A heap out‑of‑bounds write flaw exists in Crypt::OpenSSL::PKCS12 for Perl versions through 1.94 when a PKCS12 file contains a SAFEBAG with an OCTET STRING or BIT STRING attribute of one gigabyte or larger. Invoking the info() or info_as_hash() functions triggers a signed integer overflow in the size calculation passed to Renew(), resulting in hostile memory corruption with the potential for remote code execution (RCE). The weakness is identified as CWE‑787.

Affected Systems

The vulnerable product is Crypt::OpenSSL::PKCS12 provided by vendor JONASBN. All releases up to and including 1.94 are affected; release 1.95 and later contain the fix.

Risk and Exploitability

The vulnerability carries high risk because it can be abused to corrupt heap memory and potentially execute arbitrary code. No EPSS score is available and the flaw is not listed in the CISA KEV catalog. Exploitation requires an attacker to supply a crafted PKCS12 file with a ≥1 GiB attribute to an application that processes the file using info() or info_as_hash().

Generated by OpenCVE AI on May 18, 2026 at 01:50 UTC.

Remediation

Vendor Solution

Upgrade to 1.95 or later.


Vendor Workaround

Do not parse untrusted PKCS12 files via info or info_as_hash.


OpenCVE Recommended Actions

  • Upgrade Crypt::OpenSSL::PKCS12 to version 1.95 or later, which contains the heap OOB fix.
  • If upgrading is not immediately possible, avoid calling the info() or info_as_hash() functions on any PKCS12 files that originate from untrusted sources.
  • Apply the upstream patch referenced in the commit https://github.com/dsully/perl-crypt-openssl-pkcs12/commit/b9d0469c6d8f5b5c6c2a45a3d0647a532b749397.patch to mitigate the issue until a full release can be installed.

Generated by OpenCVE AI on May 18, 2026 at 01:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 18 May 2026 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Jonasbn
Jonasbn crypt::openssl::pkcs12
Vendors & Products Jonasbn
Jonasbn crypt::openssl::pkcs12

Mon, 18 May 2026 00:15:00 +0000

Type Values Removed Values Added
Description Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out of bound (OOB) write flaws. When parsing a PKCS12 file, with a >= 1 GiB OCTET STRING (or BIT STRING) attribute on a SAFEBAG, via info() or info_as_hash(), a heap-OOB-WRITE would be triggered which could have Remote Code Execution (RCE) potential. Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out-of-bounds (OOB) write flaws. When parsing a PKCS12 file, with a >= 1 GiB OCTET STRING (or BIT STRING) attribute on a SAFEBAG, via info() or info_as_hash(), a heap out-of-bounds write would be triggered with remote-code-execution potential (RCE) due to a signed integer overflow in the size calculation passed to Renew().
Title Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out of bound (OOB) write flaws Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out-of-bounds (OOB) write flaws

Sun, 17 May 2026 22:30:00 +0000

Type Values Removed Values Added
References

Sun, 17 May 2026 19:00:00 +0000

Type Values Removed Values Added
Description Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out of bound (OOB) write flaws. When parsing a PKCS12 file, with a >= 1 GiB OCTET STRING (or BIT STRING) attribute on a SAFEBAG, via info() or info_as_hash(), a heap-OOB-WRITE would be triggered which could have Remote Code Execution (RCE) potential.
Title Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out of bound (OOB) write flaws
Weaknesses CWE-787
References

Subscriptions

Jonasbn Crypt::openssl::pkcs12
cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-05-18T00:08:32.838Z

Reserved: 2026-05-13T22:45:07.737Z

Link: CVE-2026-8507

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-17T19:16:24.590

Modified: 2026-05-18T00:16:36.733

Link: CVE-2026-8507

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-18T10:49:04Z

Weaknesses