Логотип exploitDog
bind:"CVE-2022-3786"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2022-3786"

Количество 14

Количество 14

ubuntu логотип

CVE-2022-3786

больше 2 лет назад

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2022-3786

больше 2 лет назад

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.

CVSS3: 7.5
EPSS: Средний
nvd логотип

CVE-2022-3786

больше 2 лет назад

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2022-3786

больше 2 лет назад

A buffer overrun can be triggered in X.509 certificate verification, s ...

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-h8jm-2x53-xhp5

больше 2 лет назад

X.509 Email Address Variable Length Buffer Overflow

CVSS3: 7.5
EPSS: Средний
msrc логотип

CVE-2022-3786

больше 2 лет назад

OpenSSL: CVE-2022-3786 X.509 certificate verification buffer overrun

EPSS: Средний
fstec логотип

BDU:2022-06609

больше 2 лет назад

Уязвимость функционала проверки сертификата X.509 библиотеки OpenSSL, позволяющая нарушителю аварийно завершить работу приложения

CVSS3: 8.1
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2022:4586-1

больше 2 лет назад

Security update for openssl-3

EPSS: Низкий
rocky логотип

RLSA-2022:7288

больше 2 лет назад

Important: openssl security update

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9968

больше 2 лет назад

ELSA-2022-9968: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-7288

больше 2 лет назад

ELSA-2022-7288: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-10004

больше 2 лет назад

ELSA-2022-10004: openssl security update (IMPORTANT)

EPSS: Низкий
msrc логотип

CVE-2022-3602

больше 2 лет назад

OpenSSL: CVE-2022-3602 X.509 certificate verification buffer overrun

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2022:3843-1

больше 2 лет назад

Security update for openssl-3

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-3786

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.

CVSS3: 7.5
19%
Средний
больше 2 лет назад
redhat логотип
CVE-2022-3786

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.

CVSS3: 7.5
19%
Средний
больше 2 лет назад
nvd логотип
CVE-2022-3786

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.

CVSS3: 7.5
19%
Средний
больше 2 лет назад
debian логотип
CVE-2022-3786

A buffer overrun can be triggered in X.509 certificate verification, s ...

CVSS3: 7.5
19%
Средний
больше 2 лет назад
github логотип
GHSA-h8jm-2x53-xhp5

X.509 Email Address Variable Length Buffer Overflow

CVSS3: 7.5
19%
Средний
больше 2 лет назад
msrc логотип
CVE-2022-3786

OpenSSL: CVE-2022-3786 X.509 certificate verification buffer overrun

19%
Средний
больше 2 лет назад
fstec логотип
BDU:2022-06609

Уязвимость функционала проверки сертификата X.509 библиотеки OpenSSL, позволяющая нарушителю аварийно завершить работу приложения

CVSS3: 8.1
19%
Средний
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:4586-1

Security update for openssl-3

больше 2 лет назад
rocky логотип
RLSA-2022:7288

Important: openssl security update

больше 2 лет назад
oracle-oval логотип
ELSA-2022-9968

ELSA-2022-9968: openssl security update (IMPORTANT)

больше 2 лет назад
oracle-oval логотип
ELSA-2022-7288

ELSA-2022-7288: openssl security update (IMPORTANT)

больше 2 лет назад
oracle-oval логотип
ELSA-2022-10004

ELSA-2022-10004: openssl security update (IMPORTANT)

больше 2 лет назад
msrc логотип
CVE-2022-3602

OpenSSL: CVE-2022-3602 X.509 certificate verification buffer overrun

85%
Высокий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:3843-1

Security update for openssl-3

больше 2 лет назад

Уязвимостей на страницу