Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 17 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Osslsigncode Project
Osslsigncode Project osslsigncode |
|
| CPEs | cpe:2.3:a:osslsigncode_project:osslsigncode:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Osslsigncode Project
Osslsigncode Project osslsigncode |
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mtrojnar
Mtrojnar osslsigncode |
|
| Vendors & Products |
Mtrojnar
Mtrojnar osslsigncode |
Thu, 09 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Apr 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | osslsigncode is a tool that implements Authenticode signing and timestamping. Prior to 2.12, A stack buffer overflow vulnerability exists in osslsigncode in several signature verification paths. During verification of a PKCS#7 signature, the code copies the digest value from a parsed SpcIndirectDataContent structure into a fixed-size stack buffer (mdbuf[EVP_MAX_MD_SIZE], 64 bytes) without validating that the source length fits within the destination buffer. This pattern is present in the verification handlers for PE, MSI, CAB, and script files. An attacker can craft a malicious signed file with an oversized digest field in SpcIndirectDataContent. When a user verifies such a file with osslsigncode verify, the unbounded memcpy can overflow the stack buffer and corrupt adjacent stack state. This vulnerability is fixed in 2.12. | |
| Title | osslsigncode has a Stack Buffer Overflow via Unbounded Digest Copy During Signature Verification | |
| Weaknesses | CWE-121 CWE-787 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-09T16:15:19.583Z
Reserved: 2026-04-07T19:13:20.378Z
Link: CVE-2026-39853
Updated: 2026-04-09T16:13:53.250Z
Status : Analyzed
Published: 2026-04-09T16:16:31.233
Modified: 2026-04-17T20:03:45.763
Link: CVE-2026-39853
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:32:23Z