CVE-2021-3712
MySQL vulnerability analysis and mitigation

Overview

ASN.1 strings are represented internally within OpenSSL as an ASN1STRING structure which contains a buffer holding the string data and a field holding the buffer length. A vulnerability was discovered where OpenSSL functions assume ASN1STRING byte arrays will be NUL terminated, even though this is not guaranteed for directly constructed strings. This vulnerability affects OpenSSL versions 1.1.1k and below, as well as versions 1.0.2y and below (OpenSSL Advisory).

Technical details

The vulnerability occurs because numerous OpenSSL functions that print ASN.1 data assume the ASN1STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. When an application requests an ASN.1 structure to be printed, and that structure contains ASN1STRINGs directly constructed without NUL terminating the 'data' field, a read buffer overrun can occur. This can also happen during name constraints processing of certificates and in the X509get1email(), X509REQget1email() and X509get1_ocsp() functions (OpenSSL Advisory).

Impact

If successfully exploited, this vulnerability could result in a crash causing a denial of service attack. It could also lead to the disclosure of private memory contents such as private keys or sensitive plaintext (OpenSSL Advisory).

Mitigation and workarounds

Users of OpenSSL versions 1.1.1k and below should upgrade to version 1.1.1l. Users of OpenSSL versions 1.0.2y and below should upgrade to version 1.0.2za if they have premium support, otherwise they should upgrade to version 1.1.1l. OpenSSL 1.0.2 is out of support and no longer receiving public updates (OpenSSL Advisory).

Community reactions

Multiple vendors and organizations issued advisories and patches for this vulnerability, including Oracle, Red Hat, Debian, and others. The vulnerability was initially reported by Ingo Schwarze, with additional instances discovered through subsequent analysis by David Benjamin and Matt Caswell (OpenSSL Advisory).

Additional resources


SourceThis report was generated using AI

Related MySQL vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-53054MEDIUM5.5
  • MySQLMySQL
  • mysql8.4-common
NoYesOct 21, 2025
CVE-2025-53053MEDIUM5.5
  • MySQLMySQL
  • mysql8.4-common
NoYesOct 21, 2025
CVE-2025-53069MEDIUM4.9
  • MySQLMySQL
  • mysql-common
NoYesOct 21, 2025
CVE-2025-53067MEDIUM4.9
  • MySQLMySQL
  • cpe:2.3:a:oracle:mysql_server
NoYesOct 21, 2025
CVE-2025-53062MEDIUM4.9
  • MySQLMySQL
  • mecab-ipadic
NoYesOct 21, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management