[RUSTSEC-2022-0065] X.509 Email Address Variable Length Buffer Overflow

Severity High
Affected Packages 1
Unaffected Packages 1
Fixed Packages 1
CVEs 1

A buffer overrun can be triggered in X.509 certificate verification,
specifically in name constraint checking. Note that this occurs after
certificate chain signature verification and requires either a CA to
have signed a malicious certificate or for an application to continue
certificate verification despite failure to construct a path to a trusted
issuer. An attacker can craft a malicious email address in a certificate
to overflow an arbitrary number of bytes containing the . character
(decimal 46) on the stack. This buffer overflow could result in a crash
(causing a denial of service).

In a TLS client, this can be triggered by connecting to a malicious
server. In a TLS server, this can be triggered if the server requests
client authentication and a malicious client connects.

Package Affected Version
pkg:cargo/openssl-src >= 300.0.0, < 300.0.11
Package Unaffected Version
pkg:cargo/openssl-src < 300.0.0
Package Fixed Version
pkg:cargo/openssl-src >= 300.0.11
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Fixed pkg:cargo/openssl-src openssl-src >= 300.0.11
Affected pkg:cargo/openssl-src openssl-src >= 300.0.0 < 300.0.11
Unaffected pkg:cargo/openssl-src openssl-src < 300.0.0
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...