Stack Buffer Overflow in osslsigncode Affects Verification of Signed Files
CVE-2026-39853

7.8HIGH

Key Information:

Vendor

Mtrojnar

Vendor
CVE Published:
9 April 2026

What is CVE-2026-39853?

The osslsigncode tool, responsible for Authenticode signing and timestamping, is susceptible to a stack buffer overflow vulnerability present in various signature verification processes. This issue occurs when the tool processes a PKCS#7 signature and improperly copies a digest value from a SpcIndirectDataContent structure into a fixed-size stack buffer, without verifying the length of the source. Attackers can exploit this flaw by crafting a malicious signed file that includes an oversized digest field in the SpcIndirectDataContent. When users attempt to verify such files using osslsigncode, the faulty unbounded memory copy can lead to stack buffer overflow, compromising the integrity of the stack and potentially executing arbitrary code. This vulnerability has been addressed in osslsigncode version 2.12.

Affected Version(s)

osslsigncode < 2.12

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.