The *_from_pem_callback APIs did not validate the length returned by the user's callback. A password callback that returns a value larger than the buffer it was given can cause some versions of OpenSSL to over-read this buffer. OpenSSL 3.x is not affected by this.
0.10.78Exploitability
AV:NAC:LAT:PPR:NUI:NVulnerable System
VC:LVI:NVA:LSubsequent System
SC:NSI:NSA:N1.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:U