QID 38855
Date Published: 2021-12-10
QID 38855: Open Secure Sockets Layer (OpenSSL) Security Update (OpenSSL Security Advisory 20210824)
An OpenSSL TLS server In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter..
Affected Versions:
OpenSSL version 1.1.1k and below
QID Detection Logic:(Unauthenticated)
This QID matches vulnerable versions based on the exposed banner information.
Successful exploitation of the vulnerability enables untrusted users to modify OpenSSL's default configuration, insert CA certificates, modify (or even replace) existing engine modules, etc.
- OpenSSL Security Advisory 20210824 -
www.openssl.org/news/secadv/20210824.txt
CVEs related to QID 38855
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| 20210824 |
|