Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-0778

Опубликовано: 15 мар. 2022
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities...

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

2022.11-2
esm-apps/bionic

needs-triage

esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

DNE

esm-infra/focal

needs-triage

focal

ignored

end of standard support, was needs-triage
impish

ignored

end of life
jammy

needs-triage

kinetic

not-affected

2022.05-4

Показывать по

РелизСтатусПримечание
bionic

not-affected

uses system openssl1.0
devel

not-affected

uses system openssl1.1
esm-apps/bionic

not-affected

uses system openssl1.0
esm-apps/focal

not-affected

uses system openssl1.1
esm-apps/jammy

released

12.22.9~dfsg-1ubuntu3.1
esm-apps/noble

not-affected

uses system openssl1.1
esm-apps/xenial

not-affected

uses system openssl
esm-infra-legacy/trusty

not-affected

uses system openssl
focal

not-affected

uses system openssl1.1
impish

not-affected

uses system openssl1.1

Показывать по

РелизСтатусПримечание
bionic

released

1.1.1-1ubuntu2.1~18.04.15
devel

released

3.0.2-0ubuntu1
esm-infra-legacy/trusty

not-affected

1.0.1f-1ubuntu2.27+esm5
esm-infra/bionic

not-affected

1.1.1-1ubuntu2.1~18.04.15
esm-infra/focal

not-affected

1.1.1f-1ubuntu2.12
esm-infra/xenial

released

1.0.2g-1ubuntu4.20+esm2
fips-preview/jammy

released

3.0.2-0ubuntu1
fips-updates/bionic

released

1.1.1-1ubuntu2.fips.2.1~18.04.15
fips-updates/focal

released

1.1.1f-1ubuntu2.fips.12
fips-updates/jammy

released

3.0.2-0ubuntu1

Показывать по

РелизСтатусПримечание
bionic

released

1.0.2n-1ubuntu5.8
devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

1.0.2n-1ubuntu5.8
esm-infra/focal

DNE

focal

DNE

impish

DNE

jammy

DNE

kinetic

DNE

lunar

DNE

Показывать по

EPSS

Процентиль: 90%
0.05911
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
больше 3 лет назад

The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities...

CVSS3: 7.5
nvd
больше 3 лет назад

The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities pa

CVSS3: 7.5
msrc
около 3 лет назад

Описание отсутствует

CVSS3: 7.5
debian
больше 3 лет назад

The BN_mod_sqrt() function, which computes a modular square root, cont ...

suse-cvrf
больше 3 лет назад

Security update for openssl-1_0_0

EPSS

Процентиль: 90%
0.05911
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Уязвимость CVE-2022-0778