Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out of bound (OOB) write flaws.
When parsing a PKCS12 file, with a >= 1 GiB OCTET STRING (or BIT STRING) attribute on a SAFEBAG, via info() or info_as_hash(), a heap-OOB-WRITE would be triggered which could have Remote Code Execution (RCE) potential.
When parsing a PKCS12 file, with a >= 1 GiB OCTET STRING (or BIT STRING) attribute on a SAFEBAG, via info() or info_as_hash(), a heap-OOB-WRITE would be triggered which could have Remote Code Execution (RCE) potential.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
Upgrade to 1.95 or later.
Workaround
Do not parse untrusted PKCS12 files via info or info_as_hash.
References
History
Sun, 17 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out of bound (OOB) write flaws. When parsing a PKCS12 file, with a >= 1 GiB OCTET STRING (or BIT STRING) attribute on a SAFEBAG, via info() or info_as_hash(), a heap-OOB-WRITE would be triggered which could have Remote Code Execution (RCE) potential. | |
| Title | Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out of bound (OOB) write flaws | |
| Weaknesses | CWE-787 | |
| References |
|
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-05-17T18:43:05.863Z
Reserved: 2026-05-13T22:45:07.737Z
Link: CVE-2026-8507
No data.
Status : Received
Published: 2026-05-17T19:16:24.590
Modified: 2026-05-17T19:16:24.590
Link: CVE-2026-8507
No data.
OpenCVE Enrichment
Updated: 2026-05-17T20:30:09Z
Weaknesses