CVE-2026-39853 PUBLISHED

osslsigncode has a Stack Buffer Overflow via Unbounded Digest Copy During Signature Verification

Assigner: GitHub_M
Reserved: 07.04.2026 Published: 09.04.2026 Updated: 09.04.2026

osslsigncode is a tool that implements Authenticode signing and timestamping. Prior to 2.12, A stack buffer overflow vulnerability exists in osslsigncode in several signature verification paths. During verification of a PKCS#7 signature, the code copies the digest value from a parsed SpcIndirectDataContent structure into a fixed-size stack buffer (mdbuf[EVP_MAX_MD_SIZE], 64 bytes) without validating that the source length fits within the destination buffer. This pattern is present in the verification handlers for PE, MSI, CAB, and script files. An attacker can craft a malicious signed file with an oversized digest field in SpcIndirectDataContent. When a user verifies such a file with osslsigncode verify, the unbounded memcpy can overflow the stack buffer and corrupt adjacent stack state. This vulnerability is fixed in 2.12.

Metrics

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS Score: 7.8

Product Status

Vendor mtrojnar
Product osslsigncode
Versions
  • Version < 2.12 is affected

References

Problem Types

  • CWE-121: Stack-based Buffer Overflow CWE
  • CWE-787: Out-of-bounds Write CWE