CVE-2022-3786
Published: 1 November 2022
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.
Notes
Author | Note |
---|---|
mdeslaur | 3.x only While developing the fix for CVE-2022-3602, a second buffer overflow was discovered and this additional CVE was issued. The updated packages that fix this issue ommited the CVE number from the changelog as it was assigned at a later date. |
Priority
Status
Package | Release | Status |
---|---|---|
openssl1.0 Launchpad, Ubuntu, Debian |
trusty |
Does not exist
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
bionic |
Not vulnerable
|
|
focal |
Does not exist
|
|
jammy |
Does not exist
|
|
openssl Launchpad, Ubuntu, Debian |
trusty |
Not vulnerable
|
xenial |
Not vulnerable
|
|
bionic |
Not vulnerable
(1.1.1-1ubuntu2.1~18.04.20)
|
|
focal |
Not vulnerable
(1.1.1f-1ubuntu2.16)
|
|
jammy |
Released
(3.0.2-0ubuntu1.7)
|
|
kinetic |
Released
(3.0.5-2ubuntu2)
|
|
upstream |
Released
(3.0.7-1)
|
|
lunar |
Released
(3.0.5-2ubuntu2)
|
|
nodejs Launchpad, Ubuntu, Debian |
trusty |
Not vulnerable
(uses system openssl)
|
xenial |
Not vulnerable
(uses system openssl)
|
|
bionic |
Not vulnerable
(uses system openssl1.0)
|
|
focal |
Not vulnerable
(uses system openssl1.1)
|
|
upstream |
Needs triage
|
|
jammy |
Not vulnerable
(uses openssl 1.1)
|
|
kinetic |
Not vulnerable
(uses system openssl)
|
|
lunar |
Not vulnerable
(uses system openssl)
|
|
edk2 Launchpad, Ubuntu, Debian |
trusty |
Ignored
(end of standard support)
|
bionic |
Not vulnerable
|
|
focal |
Not vulnerable
|
|
jammy |
Not vulnerable
|
|
kinetic |
Not vulnerable
|
|
upstream |
Needs triage
|
|
xenial |
Needs triage
|
|
lunar |
Not vulnerable
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |