Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-3602

Опубликовано: 01 нояб. 2022
Источник: ubuntu
Приоритет: high
EPSS Высокий
CVSS3: 7.5

Описание

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to...

РелизСтатусПримечание
bionic

not-affected

devel

not-affected

esm-apps/bionic

not-affected

esm-apps/xenial

needs-triage

esm-infra/focal

not-affected

focal

not-affected

jammy

not-affected

kinetic

not-affected

lunar

not-affected

mantic

not-affected

Показывать по

РелизСтатусПримечание
bionic

not-affected

uses system openssl1.0
devel

not-affected

uses system openssl
esm-apps/bionic

not-affected

uses system openssl1.0
esm-apps/focal

not-affected

uses system openssl1.1
esm-apps/jammy

not-affected

uses openssl 1.1
esm-apps/noble

not-affected

uses system openssl
esm-apps/xenial

not-affected

uses system openssl
esm-infra-legacy/trusty

not-affected

uses system openssl
focal

not-affected

uses system openssl1.1
jammy

not-affected

uses openssl 1.1

Показывать по

РелизСтатусПримечание
bionic

not-affected

1.1.1-1ubuntu2.1~18.04.20
devel

released

3.0.5-2ubuntu2
esm-infra-legacy/trusty

not-affected

esm-infra/bionic

not-affected

1.1.1-1ubuntu2.1~18.04.20
esm-infra/focal

not-affected

1.1.1f-1ubuntu2.16
esm-infra/xenial

not-affected

fips-preview/jammy

released

3.0.2-0ubuntu1.7+fips.1
fips-updates/bionic

not-affected

fips-updates/focal

not-affected

fips-updates/jammy

released

3.0.2-0ubuntu1.7+fips.1

Показывать по

РелизСтатусПримечание
bionic

not-affected

esm-infra/bionic

not-affected

esm-infra/focal

DNE

focal

DNE

jammy

DNE

trusty

DNE

upstream

needs-triage

xenial

DNE

Показывать по

EPSS

Процентиль: 99%
0.85032
Высокий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
больше 2 лет назад

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to...

CVSS3: 7.5
nvd
больше 2 лет назад

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to up

CVSS3: 7.5
debian
больше 2 лет назад

A buffer overrun can be triggered in X.509 certificate verification, s ...

CVSS3: 9.8
github
больше 2 лет назад

X.509 Email Address 4-byte Buffer Overflow

CVSS3: 9.8
fstec
больше 2 лет назад

Уязвимость функционала проверки сертификата X.509 библиотеки OpenSSL, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 99%
0.85032
Высокий

7.5 High

CVSS3