Vulnerability Description
x509_constraints_parse_mailbox in lib/libcrypto/x509/x509_constraints.c in LibreSSL through 3.4.0 has a stack-based buffer over-read. When the input exceeds DOMAIN_PART_MAX_LEN, the buffer lacks '\0' termination.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openbsd | Libressl | <= 3.4.0 |
Related Weaknesses (CWE)
References
- https://github.com/libressl-portable/openbsd/issues/126ExploitIssue TrackingPatch
- https://github.com/libressl-portable/openbsd/issues/126ExploitIssue TrackingPatch
FAQ
What is CVE-2021-41581?
CVE-2021-41581 is a vulnerability with a CVSS score of 5.5 (MEDIUM). x509_constraints_parse_mailbox in lib/libcrypto/x509/x509_constraints.c in LibreSSL through 3.4.0 has a stack-based buffer over-read. When the input exceeds DOMAIN_PART_MAX_LEN, the buffer lacks '\0' ...
How severe is CVE-2021-41581?
CVE-2021-41581 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-41581?
Check the references section above for vendor advisories and patch information. Affected products include: Openbsd Libressl.