Vulnerability Details CVE-2021-41581
x509_constraints_parse_mailbox in lib/libcrypto/x509/x509_constraints.c in LibreSSL through 3.4.0 has a stack-based buffer over-read. When the input exceeds DOMAIN_PART_MAX_LEN, the buffer lacks '\0' termination.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 53.1%
CVSS Severity
CVSS v3 Score 5.5
CVSS v2 Score 4.3
Products affected by CVE-2021-41581
-
cpe:2.3:a:openbsd:libressl:-
-
cpe:2.3:a:openbsd:libressl:2.0.0
-
cpe:2.3:a:openbsd:libressl:2.0.1
-
cpe:2.3:a:openbsd:libressl:2.0.2
-
cpe:2.3:a:openbsd:libressl:2.0.3
-
cpe:2.3:a:openbsd:libressl:2.0.4
-
cpe:2.3:a:openbsd:libressl:2.0.5
-
cpe:2.3:a:openbsd:libressl:2.0.6
-
cpe:2.3:a:openbsd:libressl:2.1.0
-
cpe:2.3:a:openbsd:libressl:2.1.1
-
cpe:2.3:a:openbsd:libressl:2.1.10
-
cpe:2.3:a:openbsd:libressl:2.1.2
-
cpe:2.3:a:openbsd:libressl:2.1.3
-
cpe:2.3:a:openbsd:libressl:2.1.4
-
cpe:2.3:a:openbsd:libressl:2.1.5
-
cpe:2.3:a:openbsd:libressl:2.1.6
-
cpe:2.3:a:openbsd:libressl:2.1.7
-
cpe:2.3:a:openbsd:libressl:2.1.8
-
cpe:2.3:a:openbsd:libressl:2.1.9
-
cpe:2.3:a:openbsd:libressl:2.2.0
-
cpe:2.3:a:openbsd:libressl:2.2.1
-
cpe:2.3:a:openbsd:libressl:2.2.2
-
cpe:2.3:a:openbsd:libressl:2.2.3
-
cpe:2.3:a:openbsd:libressl:2.2.4
-
cpe:2.3:a:openbsd:libressl:2.2.5
-
cpe:2.3:a:openbsd:libressl:2.2.6
-
cpe:2.3:a:openbsd:libressl:2.2.7
-
cpe:2.3:a:openbsd:libressl:2.2.8
-
cpe:2.3:a:openbsd:libressl:2.2.9
-
cpe:2.3:a:openbsd:libressl:2.3.0
-
cpe:2.3:a:openbsd:libressl:2.3.1
-
cpe:2.3:a:openbsd:libressl:2.3.10
-
cpe:2.3:a:openbsd:libressl:2.3.2
-
cpe:2.3:a:openbsd:libressl:2.3.3
-
cpe:2.3:a:openbsd:libressl:2.3.4
-
cpe:2.3:a:openbsd:libressl:2.3.5
-
cpe:2.3:a:openbsd:libressl:2.3.6
-
cpe:2.3:a:openbsd:libressl:2.3.7
-
cpe:2.3:a:openbsd:libressl:2.3.8
-
cpe:2.3:a:openbsd:libressl:2.3.9
-
cpe:2.3:a:openbsd:libressl:2.4.0
-
cpe:2.3:a:openbsd:libressl:2.4.1
-
cpe:2.3:a:openbsd:libressl:2.4.2
-
cpe:2.3:a:openbsd:libressl:2.4.3
-
cpe:2.3:a:openbsd:libressl:2.4.4
-
cpe:2.3:a:openbsd:libressl:2.4.5
-
cpe:2.3:a:openbsd:libressl:2.5.0
-
cpe:2.3:a:openbsd:libressl:2.5.1
-
cpe:2.3:a:openbsd:libressl:2.5.2
-
cpe:2.3:a:openbsd:libressl:2.5.3
-
cpe:2.3:a:openbsd:libressl:2.5.4
-
cpe:2.3:a:openbsd:libressl:2.5.5
-
cpe:2.3:a:openbsd:libressl:2.6.0
-
cpe:2.3:a:openbsd:libressl:2.6.1
-
cpe:2.3:a:openbsd:libressl:2.6.2
-
cpe:2.3:a:openbsd:libressl:2.6.3
-
cpe:2.3:a:openbsd:libressl:2.6.4
-
cpe:2.3:a:openbsd:libressl:2.6.5
-
cpe:2.3:a:openbsd:libressl:2.7.0
-
cpe:2.3:a:openbsd:libressl:2.7.1
-
cpe:2.3:a:openbsd:libressl:2.7.2
-
cpe:2.3:a:openbsd:libressl:2.7.3
-
cpe:2.3:a:openbsd:libressl:2.7.4
-
cpe:2.3:a:openbsd:libressl:2.7.5
-
cpe:2.3:a:openbsd:libressl:2.8.0
-
cpe:2.3:a:openbsd:libressl:2.8.1
-
cpe:2.3:a:openbsd:libressl:2.8.2
-
cpe:2.3:a:openbsd:libressl:2.8.3
-
cpe:2.3:a:openbsd:libressl:2.9.0
-
cpe:2.3:a:openbsd:libressl:2.9.1
-
cpe:2.3:a:openbsd:libressl:2.9.2
-
cpe:2.3:a:openbsd:libressl:3.0.0
-
cpe:2.3:a:openbsd:libressl:3.0.1
-
cpe:2.3:a:openbsd:libressl:3.0.2
-
cpe:2.3:a:openbsd:libressl:3.1.0
-
cpe:2.3:a:openbsd:libressl:3.1.1
-
cpe:2.3:a:openbsd:libressl:3.1.2
-
cpe:2.3:a:openbsd:libressl:3.1.3
-
cpe:2.3:a:openbsd:libressl:3.1.4
-
cpe:2.3:a:openbsd:libressl:3.1.5
-
cpe:2.3:a:openbsd:libressl:3.2.0
-
cpe:2.3:a:openbsd:libressl:3.2.1
-
cpe:2.3:a:openbsd:libressl:3.2.2
-
cpe:2.3:a:openbsd:libressl:3.2.3
-
cpe:2.3:a:openbsd:libressl:3.2.4
-
cpe:2.3:a:openbsd:libressl:3.2.5
-
cpe:2.3:a:openbsd:libressl:3.2.6
-
cpe:2.3:a:openbsd:libressl:3.3.0
-
cpe:2.3:a:openbsd:libressl:3.3.1
-
cpe:2.3:a:openbsd:libressl:3.3.2
-
cpe:2.3:a:openbsd:libressl:3.3.3
-
cpe:2.3:a:openbsd:libressl:3.3.4
-
cpe:2.3:a:openbsd:libressl:3.3.6
-
cpe:2.3:a:openbsd:libressl:3.4.0