CVE-2022-3786
Published: 1 November 2022
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.
Notes
| Author | Note |
|---|---|
| mdeslaur | 3.x only While developing the fix for CVE-2022-3602, a second buffer overflow was discovered and this additional CVE was issued. The updated packages that fix this issue ommited the CVE number from the changelog as it was assigned at a later date. |
Priority
Status
| Package | Release | Status |
|---|---|---|
|
edk2 Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
|
| focal |
Not vulnerable
|
|
| jammy |
Not vulnerable
|
|
| kinetic |
Not vulnerable
|
|
| lunar |
Not vulnerable
|
|
| mantic |
Not vulnerable
|
|
| noble |
Not vulnerable
|
|
| trusty |
Ignored
(end of standard support)
|
|
| upstream |
Needs triage
|
|
| xenial |
Needs triage
|
|
|
nodejs Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(uses system openssl1.0)
|
| focal |
Not vulnerable
(uses system openssl1.1)
|
|
| jammy |
Not vulnerable
(uses openssl 1.1)
|
|
| kinetic |
Not vulnerable
(uses system openssl)
|
|
| lunar |
Not vulnerable
(uses system openssl)
|
|
| mantic |
Not vulnerable
(uses system openssl)
|
|
| noble |
Not vulnerable
(uses system openssl)
|
|
| trusty |
Not vulnerable
(uses system openssl)
|
|
| upstream |
Needs triage
|
|
| xenial |
Not vulnerable
(uses system openssl)
|
|
|
openssl Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(1.1.1-1ubuntu2.1~18.04.20)
|
| focal |
Not vulnerable
(1.1.1f-1ubuntu2.16)
|
|
| jammy |
Released
(3.0.2-0ubuntu1.7)
|
|
| kinetic |
Released
(3.0.5-2ubuntu2)
|
|
| lunar |
Released
(3.0.5-2ubuntu2)
|
|
| mantic |
Released
(3.0.5-2ubuntu2)
|
|
| noble |
Released
(3.0.5-2ubuntu2)
|
|
| trusty |
Not vulnerable
|
|
| upstream |
Released
(3.0.7-1)
|
|
| xenial |
Not vulnerable
|
|
|
openssl1.0 Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
|
| focal |
Does not exist
|
|
| jammy |
Does not exist
|
|
| trusty |
Does not exist
|
|
| upstream |
Needs triage
|
|
| xenial |
Does not exist
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 7.5 |
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity impact | None |
| Availability impact | High |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |