Логотип exploitDog
bind:CVE-2022-2068
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-2068

Количество 22

Количество 22

ubuntu логотип

CVE-2022-2068

почти 3 года назад

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

CVSS3: 9.8
EPSS: Высокий
redhat логотип

CVE-2022-2068

почти 3 года назад

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

CVSS3: 6.7
EPSS: Высокий
nvd логотип

CVE-2022-2068

почти 3 года назад

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

CVSS3: 9.8
EPSS: Высокий
msrc логотип

CVE-2022-2068

почти 3 года назад

CVSS3: 9.8
EPSS: Высокий
debian логотип

CVE-2022-2068

почти 3 года назад

In addition to the c_rehash shell command injection identified in CVE- ...

CVSS3: 9.8
EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2022:2181-1

почти 3 года назад

Security update for openssl

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2022:2180-1

почти 3 года назад

Security update for openssl

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2022:2179-1

почти 3 года назад

Security update for openssl

EPSS: Высокий
github логотип

GHSA-xjxr-x4h8-946x

почти 3 года назад

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

CVSS3: 9.8
EPSS: Высокий
fstec логотип

BDU:2022-04039

почти 3 года назад

Уязвимость функции модульного возведения в степень Монтгомери с постоянным временем библиотек OpenSSL и BoringSSL, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2022:2321-1

почти 3 года назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2309-1

почти 3 года назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2251-1

почти 3 года назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2197-1

почти 3 года назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2182-1

почти 3 года назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2308-1

почти 3 года назад

Security update for openssl-1_1

EPSS: Низкий
rocky логотип

RLSA-2022:5818

почти 3 года назад

Moderate: openssl security update

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9683

почти 3 года назад

ELSA-2022-9683: openssl security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-5818

почти 3 года назад

ELSA-2022-5818: openssl security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9751

почти 3 года назад

ELSA-2022-9751: openssl security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-2068

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

CVSS3: 9.8
71%
Высокий
почти 3 года назад
redhat логотип
CVE-2022-2068

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

CVSS3: 6.7
71%
Высокий
почти 3 года назад
nvd логотип
CVE-2022-2068

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

CVSS3: 9.8
71%
Высокий
почти 3 года назад
msrc логотип
CVSS3: 9.8
71%
Высокий
почти 3 года назад
debian логотип
CVE-2022-2068

In addition to the c_rehash shell command injection identified in CVE- ...

CVSS3: 9.8
71%
Высокий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:2181-1

Security update for openssl

71%
Высокий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:2180-1

Security update for openssl

71%
Высокий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:2179-1

Security update for openssl

71%
Высокий
почти 3 года назад
github логотип
GHSA-xjxr-x4h8-946x

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

CVSS3: 9.8
71%
Высокий
почти 3 года назад
fstec логотип
BDU:2022-04039

Уязвимость функции модульного возведения в степень Монтгомери с постоянным временем библиотек OpenSSL и BoringSSL, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
71%
Высокий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:2321-1

Security update for openssl-1_0_0

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:2309-1

Security update for openssl

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:2251-1

Security update for openssl-1_1

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:2197-1

Security update for openssl-1_0_0

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:2182-1

Security update for openssl-1_1

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:2308-1

Security update for openssl-1_1

почти 3 года назад
rocky логотип
RLSA-2022:5818

Moderate: openssl security update

почти 3 года назад
oracle-oval логотип
ELSA-2022-9683

ELSA-2022-9683: openssl security update (MODERATE)

почти 3 года назад
oracle-oval логотип
ELSA-2022-5818

ELSA-2022-5818: openssl security update (MODERATE)

почти 3 года назад
oracle-oval логотип
ELSA-2022-9751

ELSA-2022-9751: openssl security update (MODERATE)

почти 3 года назад

Уязвимостей на страницу