๐Ÿ” CVE Alert

CVE-2026-39853

HIGH 7.8

osslsigncode has a Stack Buffer Overflow via Unbounded Digest Copy During Signature Verification

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

osslsigncode is a tool that implements Authenticode signing and timestamping. Prior to 2.12, A stack buffer overflow vulnerability exists in osslsigncode in several signature verification paths. During verification of a PKCS#7 signature, the code copies the digest value from a parsed SpcIndirectDataContent structure into a fixed-size stack buffer (mdbuf[EVP_MAX_MD_SIZE], 64 bytes) without validating that the source length fits within the destination buffer. This pattern is present in the verification handlers for PE, MSI, CAB, and script files. An attacker can craft a malicious signed file with an oversized digest field in SpcIndirectDataContent. When a user verifies such a file with osslsigncode verify, the unbounded memcpy can overflow the stack buffer and corrupt adjacent stack state. This vulnerability is fixed in 2.12.

CWE CWE-121 CWE-787
Vendor mtrojnar
Product osslsigncode
Published Apr 9, 2026
Last Updated Apr 9, 2026
Stay Ahead of the Next One

Get instant alerts for mtrojnar osslsigncode

Be the first to know when new high vulnerabilities affecting mtrojnar osslsigncode are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

mtrojnar / osslsigncode
< 2.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/mtrojnar/osslsigncode/security/advisories/GHSA-hx87-8754-xvh4 github.com: https://github.com/mtrojnar/osslsigncode/commit/cbee1e723c5a8547302bd841ad9943ed8144db68 github.com: https://github.com/mtrojnar/osslsigncode/releases/tag/2.12