OpenSSL Stack buffer overflow vulnerability CVE-2025-15467 and impact on Symantec Directory
search cancel

OpenSSL Stack buffer overflow vulnerability CVE-2025-15467 and impact on Symantec Directory

book

Article ID: 430677

calendar_today

Updated On:

Products

CA Directory SITEMINDER CA Identity Manager

Issue/Introduction

CVE-2025-15467: OpenSSL Vulnerability Leads to Denial-of-Service, Remote Code Execution

Environment

Directory releases 14.1 SP6 and 14.1 SP7

Cause

The CAPKI  component with in Directory contains a known security vulnerability identified as CVE-2025-15467,  This issue involves a stack buffer overflow occurring during CMS AuthEnvelopedData parsing. 

Resolution

Resolution

- Broadcom Directory DEV team has published patches to remediate the vulnerability for the Directory releases 14.1 SP6 and 14.1 SP7

- Each patch contains the binaries to be deployed with a README.txt file with the deployment steps.

- The patches by version are enclosed 

If you have any questions or require assistance, please contact Customer Support at +1-800-225-5224 in North America or see https://support.broadcom.com/contact-support.html for the local number in your country.

Thank you for your continued partnership.

Sincerely,
Symantec Directory Team

Additional Information

No other Directory versions are impacted.

The Directory Manager is a web application that stores the configuration information. The dxagent component, which includes the OpenSSL binary to be replaced, is installed individually in each server to enable the management of DSA's by the Directory Manager.

Known Issue: Replication Failure Post-Patch/SP6/SP7 (Public CAs)

Some clients running Directory releases 14.1 SP6 and 14.1 SP7 may experience replication failures if they are using certificates signed by a public Certificate Authority (CA).

  - Root Cause: The issue stems from the industry-wide discontinuation of support for a single certificate being used for both client and server authentication. This change is mandated by the Chrome Root Program Policy version 1.8 (Section 1.3.2), which promotes the use of Dedicated TLS Server Authentication PKI Hierarchies and phases out multi-purpose roots from the Chrome Root Store. Any client using certificates signed by a public CA that follows this policy will encounter the same issue.
  - Workarounds for Replication: To ensure replication works, clients must implement one of the following suggested workarounds:
    1.  Use a non-public CA that does not adhere to the Chrome Root Program Policy.
    2.  Disable the link-flags for SSL/TLS.

Note to IGA Customers

Upcoming IGA 15.0.0 fix pack 5 will have this patch bundled for managed user store. If you are using Symantec Directory as external user store, follow the resolution above.

IGA 14.5.1 VApp includes Directory 14.1 SP5 and hence no action is needed.

Attachments

Directory_14.1.SP7.zip get_app
Directory_14.1.SP6.zip get_app