Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2751 articles · 110054 vulns · 36/41 feeds (7d)
← Back to list
—
CVE-2026-31789PATCHED
openssl · openssl

Heap Buffer Overflow in Hexadecimal Conversion

Description

Issue summary: Converting an excessively large OCTET STRING value to a hexadecimal string leads to a heap buffer overflow on 32 bit platforms. Impact summary: A heap buffer overflow may lead to a crash or possibly an attacker controlled code execution or other undefined behavior. If an attacker can supply a crafted X.509 certificate with an excessively large OCTET STRING value in extensions such as the Subject Key Identifier (SKID) or Authority Key Identifier (AKID) which are being converted to hex, the size of the buffer needed for the result is calculated as multiplication of the input length by 3. On 32 bit platforms, this multiplication may overflow resulting in the allocation of a smaller buffer and a heap buffer overflow. Applications and services that print or log contents of untrusted X.509 certificates are vulnerable to this issue. As the certificates would have to have sizes of over 1 Gigabyte, printing or logging such certificates is a fairly unlikely operation and only 32 bit platforms are affected, this issue was assigned Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.

Affected Products

VendorProductVersions
opensslopenssl3.6.0, 3.5.0, 3.4.0, 3.3.0, 3.0.0

References

  • https://openssl-library.org/news/secadv/20260407.txt(vendor-advisory)
  • https://github.com/openssl/openssl/commit/a24216018e1ede8ff01a4ff5afff7dfbd443e2f9(patch)
  • https://github.com/openssl/openssl/commit/945b935ac66cc7f1a41f1b849c7c25adb5351f49(patch)
  • https://github.com/openssl/openssl/commit/364f095b80601db632b0def6a33316967f863bde(patch)
  • https://github.com/openssl/openssl/commit/7a9087efd769f362ad9c0e30c7baaa6bbfa65ecf(patch)
  • https://github.com/openssl/openssl/commit/a91e537d16d74050dbde50bb0dfb1fe9930f0521(patch)

Related News (3 articles)

Tier A
Microsoft MSRC3d ago
CVE-2026-31789 Heap Buffer Overflow in Hexadecimal Conversion
→ No new info (linked only)
Tier B
CERT-FR4d ago
Multiples vulnérabilités dans OpenSSL (08 avril 2026)
→ No new info (linked only)
Tier C
VulDB4d ago
CVE-2026-31789 | OpenSSL up to 3.0.19/3.3.6/3.4.4/3.5.5/3.6.1 Hexadecimal Conversion heap-based overflow
→ No new info (linked only)
CISA KEV❌ No
Actively exploited❌ No
Patch available
3.6.23.5.63.4.53.3.73.0.20
CWECWE-787
PublishedApr 7, 2026
Trending Score27
Source articles3
Independent3
Info Completeness0/14
Missing: cve_id, title, description, vendor, product, versions, cvss, epss, cwe, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

MEDIUMCVE-2026-31790EXP
Incorrect Failure Handling in RSA KEM RSASVE Encapsulation
Trending: 85
HIGHCVE-2026-28390
Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo
Trending: 47
HIGHCVE-2026-28389
Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo
Trending: 43
HIGHCVE-2026-28388
NULL Pointer Dereference When Processing a Delta CRL
Trending: 35
CRITICALCVE-2026-28386
Out-of-bounds Read in AES-CFB-128 on X86-64 with AVX-512 Support
Trending: 34

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 7, 2026
Discovered by ZDM
Apr 7, 2026
Patch Available
Apr 9, 2026