Impact
A heap out‑of‑bounds write flaw exists in Crypt::OpenSSL::PKCS12 for Perl versions through 1.94 when a PKCS12 file contains a SAFEBAG with an OCTET STRING or BIT STRING attribute of one gigabyte or larger. Invoking the info() or info_as_hash() functions triggers a signed integer overflow in the size calculation passed to Renew(), resulting in hostile memory corruption with the potential for remote code execution (RCE). The weakness is identified as CWE‑787.
Affected Systems
The vulnerable product is Crypt::OpenSSL::PKCS12 provided by vendor JONASBN. All releases up to and including 1.94 are affected; release 1.95 and later contain the fix.
Risk and Exploitability
The vulnerability carries high risk because it can be abused to corrupt heap memory and potentially execute arbitrary code. No EPSS score is available and the flaw is not listed in the CISA KEV catalog. Exploitation requires an attacker to supply a crafted PKCS12 file with a ≥1 GiB attribute to an application that processes the file using info() or info_as_hash().
OpenCVE Enrichment