[SECADV-20221101-1] X.509 Email Address Variable Length Buffer Overflow
Buffer overflow
A buffer overrun can be triggered in X.509 certificate verification,
specifically in name constraint checking. Note that this occurs after
certificate chain signature verification and requires either a CA to
have signed a malicious certificate or for an application to continue
certificate verification despite failure to construct a path to a trusted
issuer. An attacker can craft a malicious email address in a certificate
to overflow an arbitrary number of bytes containing the `.' character
(decimal 46) on the stack. This buffer overflow could result in a crash
(causing a denial of service).
In a TLS client, this can be triggered by connecting to a malicious
server. In a TLS server, this can be triggered if the server requests
client authentication and a malicious client connects.
Package | Affected Version |
---|---|
pkg:openssl/openssl | = 3.0.0 |
pkg:openssl/openssl | = 3.0.1 |
pkg:openssl/openssl | = 3.0.2 |
pkg:openssl/openssl | = 3.0.3 |
pkg:openssl/openssl | = 3.0.4 |
pkg:openssl/openssl | = 3.0.5 |
pkg:openssl/openssl | = 3.0.6 |
Package | Fixed Version |
---|---|
pkg:openssl/openssl | = 3.0.7 |
- ID
- SECADV-20221101-1
- Severity
- high
- Impact
- Buffer overflow
- URL
- https://www.openssl.org/news/secadv/20221101.txt
- Published
-
2022-11-01T00:00:00
(22 months ago) - Modified
-
2022-11-01T00:00:00
(22 months ago) - Rights
- The OpenSSL Project
- Other Advisories
-
- ALPINE:CVE-2022-3786
- ALSA-2022:7288
- CISCO-SA-OPENSSL-W9SDCC2A
- ELSA-2022-10004
- ELSA-2022-7288
- ELSA-2022-9968
- FEDORA-2022-0f1d2e0537
- FEDORA-2022-502f096dce
- FREEBSD:0844671C-5A09-11ED-856E-D4C9EF517024
- GLSA-202211-01
- GLSA-202405-29
- MS:CVE-2022-3786
- RHSA-2022:7288
- RLSA-2022:7288
- RUSTSEC-2022-0065
- SUSE-SU-2022:3843-1
- SUSE-SU-2022:4586-1
- USN-5710-1
- VU:794340
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Fixed | pkg:openssl/openssl | openssl | = 3.0.7 | ||||
Affected | pkg:openssl/openssl | openssl | = 3.0.0 | ||||
Affected | pkg:openssl/openssl | openssl | = 3.0.1 | ||||
Affected | pkg:openssl/openssl | openssl | = 3.0.2 | ||||
Affected | pkg:openssl/openssl | openssl | = 3.0.3 | ||||
Affected | pkg:openssl/openssl | openssl | = 3.0.4 | ||||
Affected | pkg:openssl/openssl | openssl | = 3.0.5 | ||||
Affected | pkg:openssl/openssl | openssl | = 3.0.6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |