漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl truncates passwords with embedded NULLs
Vulnerability Description
Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl truncates passwords with embedded NULLs. Password parameters in PKCS12.xs are declared char *, which routes through Perl's default typemap to SvPV_nolen. The Perl length is discarded. The C code (or OpenSSL internally) calls strlen() on the buffer. Any password byte at or after the first NULL is silently dropped. Binary / KDF-derived / HMAC-derived passwords lose entropy without any warnings.
CVSS Information
N/A
Vulnerability Type
不恰当的空终结符
Vulnerability Title
Crypt::OpenSSL::PKCS12 安全漏洞
Vulnerability Description
Crypt::OpenSSL::PKCS12是Dan Sully个人开发者的一个用于 Perl 语言的开源密码学扩展模块,主要提供了对 OpenSSL PKCS12 API 的接口调用能力。 Crypt::OpenSSL::PKCS12 1.94及之前版本存在安全漏洞,该漏洞源于密码参数声明为char*,通过Perl默认typemap路由到SvPV_nolen,丢弃Perl长度,C代码或OpenSSL内部对缓冲区调用strlen,导致第一个NULL之后的所有密码字节被静默丢弃,二进制或KDF派生或HMAC
CVSS Information
N/A
Vulnerability Type
N/A