CVE-2026-39853

HIGH

osslsigncode has a Stack Buffer Overflow via Unbounded Digest Copy During Signature Verification

Title source: cna

Description

osslsigncode is a tool that implements Authenticode signing and timestamping. Prior to 2.12, A stack buffer overflow vulnerability exists in osslsigncode in several signature verification paths. During verification of a PKCS#7 signature, the code copies the digest value from a parsed SpcIndirectDataContent structure into a fixed-size stack buffer (mdbuf[EVP_MAX_MD_SIZE], 64 bytes) without validating that the source length fits within the destination buffer. This pattern is present in the verification handlers for PE, MSI, CAB, and script files. An attacker can craft a malicious signed file with an oversized digest field in SpcIndirectDataContent. When a user verifies such a file with osslsigncode verify, the unbounded memcpy can overflow the stack buffer and corrupt adjacent stack state. This vulnerability is fixed in 2.12.

Scores

CVSS v3 7.8
EPSS 0.0001
EPSS Percentile 3.3%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

CWE
CWE-121 CWE-787
Status published
Products (2)
mtrojnar/osslsigncode < 2.12
osslsigncode_project/osslsigncode < 2.12
Published Apr 09, 2026
Tracked Since Apr 09, 2026