Severity
9.8CRITICAL
EPSS
2.5%
top 14.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 24
Latest updateMay 24

Description

In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages23 packages

crates.ioopenssl-src0.0.0-0111.16.0+1
NVDopenssl/openssl1.1.11.1.1l
Debianopenssl< 1.1.1k-1+deb11u1+3
Ubuntuopenssl< 1.1.1-1ubuntu2.1~18.04.13+1

Also affects: Debian Linux 10.0, 11.0

Patches

🔴Vulnerability Details

6
GHSA
SM2 Decryption Buffer Overflow2022-05-24
OSV
SM2 Decryption Buffer Overflow2022-05-24
CVEList
SM2 Decryption Buffer Overflow2021-08-24
OSV
CVE-2021-3711: In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt()2021-08-24
OSV
SM2 Decryption Buffer Overflow2021-08-24

📋Vendor Advisories

8
Oracle
Oracle Oracle Health Sciences Applications Risk Matrix: Connector (OpenSSL) — CVE-2021-37112022-04-15
Oracle
Oracle Oracle Essbase Risk Matrix: Infrastructure (OpenSSL) — CVE-2021-37112022-01-15
Microsoft
OpenSSL: CVE-2021-3711 SM2 Decryption Buffer Overflow2021-11-09
Oracle
Oracle Oracle MySQL Risk Matrix: Server: Packaging (OpenSSL) — CVE-2021-37112021-10-15
BSD
FreeBSD-SA-21:16.openssl: Multiple OpenSSL vulnerabilities2021-08-24

💬Community

1
HackerOne
CVE-2021-3711: SM2 decrypt buffer overflow2021-09-27