ghsa-h8jm-2x53-xhp5
Vulnerability from github
A buffer overrun can be triggered in X.509 certificate verification,
specifically in name constraint checking. Note that this occurs after
certificate chain signature verification and requires either a CA to
have signed a malicious certificate or for an application to continue
certificate verification despite failure to construct a path to a trusted
issuer. An attacker can craft a malicious email address in a certificate
to overflow an arbitrary number of bytes containing the .
character
(decimal 46) on the stack. This buffer overflow could result in a crash
(causing a denial of service).
In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.
{ affected: [ { package: { ecosystem: "crates.io", name: "openssl-src", }, ranges: [ { events: [ { introduced: "300.0.0", }, { fixed: "300.0.11", }, ], type: "ECOSYSTEM", }, ], }, ], aliases: [ "CVE-2022-3786", ], database_specific: { cwe_ids: [ "CWE-120", ], github_reviewed: true, github_reviewed_at: "2022-11-01T17:45:21Z", nvd_published_at: "2022-11-01T18:15:00Z", severity: "HIGH", }, details: "A buffer overrun can be triggered in X.509 certificate verification,\nspecifically in name constraint checking. Note that this occurs after\ncertificate chain signature verification and requires either a CA to\nhave signed a malicious certificate or for an application to continue\ncertificate verification despite failure to construct a path to a trusted\nissuer. An attacker can craft a malicious email address in a certificate\nto overflow an arbitrary number of bytes containing the `.` character\n(decimal 46) on the stack. This buffer overflow could result in a crash\n(causing a denial of service).\n\nIn a TLS client, this can be triggered by connecting to a malicious\nserver. In a TLS server, this can be triggered if the server requests\nclient authentication and a malicious client connects.\n", id: "GHSA-h8jm-2x53-xhp5", modified: "2022-11-02T21:46:40Z", published: "2022-11-01T17:45:21Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-3786", }, { type: "WEB", url: "https://github.com/rustsec/advisory-db/pull/1452", }, { type: "WEB", url: "https://github.com/alexcrichton/openssl-src-rs/commit/4a31c14f31e1a08c18893a37e304dd1dd4b7daa3", }, { type: "WEB", url: "https://github.com/openssl/openssl/commit/fe3b639dc19b325846f4f6801f2f4604f56e3de3", }, { type: "WEB", url: "https://www.openssl.org/news/secadv/20221101.txt", }, { type: "WEB", url: "https://www.kb.cert.org/vuls/id/794340", }, { type: "WEB", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-W9sdCc2a", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20221102-0001", }, { type: "WEB", url: "https://security.gentoo.org/glsa/202211-01", }, { type: "WEB", url: "https://rustsec.org/advisories/RUSTSEC-2022-0065.html", }, { type: "WEB", url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0023", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITS", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6S", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITS", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6S", }, { type: "PACKAGE", url: "https://github.com/alexcrichton/openssl-src-rs", }, { type: "WEB", url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c42165b5706e42f67ef8ef4c351a9a4c5d21639a", }, { type: "WEB", url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=c42165b5706e42f67ef8ef4c351a9a4c5d21639a", }, { type: "WEB", url: "http://packetstormsecurity.com/files/169687/OpenSSL-Security-Advisory-20221101.html", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/01/15", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/01/16", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/01/17", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/01/18", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/01/19", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/01/20", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/01/21", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/01/24", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/02/1", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/02/10", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/02/11", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/02/12", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/02/13", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/02/14", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/02/15", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/02/2", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/02/3", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/02/5", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/02/6", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/02/7", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/02/9", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/03/1", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/03/10", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/03/11", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/03/2", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/03/3", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/03/5", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/03/6", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/03/7", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/11/03/9", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", type: "CVSS_V3", }, ], summary: "X.509 Email Address Variable Length Buffer Overflow", }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.