[RUSTSEC-2022-0065] X.509 Email Address Variable Length Buffer Overflow
A buffer overrun can be triggered in X.509 certificate verification,
specifically in name constraint checking. Note that this occurs after
certificate chain signature verification and requires either a CA to
have signed a malicious certificate or for an application to continue
certificate verification despite failure to construct a path to a trusted
issuer. An attacker can craft a malicious email address in a certificate
to overflow an arbitrary number of bytes containing the .
character
(decimal 46) on the stack. This buffer overflow could result in a crash
(causing a denial of service).
In a TLS client, this can be triggered by connecting to a malicious
server. In a TLS server, this can be triggered if the server requests
client authentication and a malicious client connects.
Package | Affected Version |
---|---|
pkg:cargo/openssl-src | >= 300.0.0, < 300.0.11 |
Package | Unaffected Version |
---|---|
pkg:cargo/openssl-src | < 300.0.0 |
Package | Fixed Version |
---|---|
pkg:cargo/openssl-src | >= 300.0.11 |
- ID
- RUSTSEC-2022-0065
- Severity
- high
- Severity from
- CVE-2022-3786
- Impact
- Denial Of Service
- URL
- https://rustsec.org/advisories/RUSTSEC-2022-0065.html
- Published
-
2022-11-01T00:00:00
(22 months ago) - Modified
-
2023-06-13T13:10:24
(15 months ago) - Other Advisories
-
- ALPINE:CVE-2022-3786
- ALSA-2022:7288
- CISCO-SA-OPENSSL-W9SDCC2A
- ELSA-2022-10004
- ELSA-2022-7288
- ELSA-2022-9968
- FEDORA-2022-0f1d2e0537
- FEDORA-2022-502f096dce
- FREEBSD:0844671C-5A09-11ED-856E-D4C9EF517024
- GLSA-202211-01
- GLSA-202405-29
- MS:CVE-2022-3786
- RHSA-2022:7288
- RLSA-2022:7288
- SECADV-20221101-1
- SUSE-SU-2022:3843-1
- SUSE-SU-2022:4586-1
- USN-5710-1
- VU:794340
Source | # ID | Name | URL |
---|---|---|---|
https://www.openssl.org/news/secadv/20221101.txt | |||
crates.io | openssl-src | https://crates.io/crates/openssl-src | |
rustsec.org | openssl-src | https://rustsec.org/packages/openssl-src.html | |
Security Advisory | GHSA-h8jm-2x53-xhp5 | https://github.com/advisories/GHSA-h8jm-2x53-xhp5 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Fixed | pkg:cargo/openssl-src | openssl-src | >= 300.0.11 | ||||
Affected | pkg:cargo/openssl-src | openssl-src | >= 300.0.0 < 300.0.11 | ||||
Unaffected | pkg:cargo/openssl-src | openssl-src | < 300.0.0 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |