QID 38855

Date Published: 2021-12-10

QID 38855: Open Secure Sockets Layer (OpenSSL) Security Update (OpenSSL Security Advisory 20210824)

An OpenSSL TLS server In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter..

Affected Versions:
OpenSSL version 1.1.1k and below

QID Detection Logic:(Unauthenticated)
This QID matches vulnerable versions based on the exposed banner information.

Successful exploitation of the vulnerability enables untrusted users to modify OpenSSL's default configuration, insert CA certificates, modify (or even replace) existing engine modules, etc.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    The vendor has released a patch. Fixed in OpenSSL 1.1.1l For more information please visit advisory.
    Vendor References

    CVEs related to QID 38855

    Software Advisories
    Advisory ID Software Component Link
    20210824 URL Logo www.openssl.org/news/secadv/20210824.txt