Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-2068
HistoryJun 21, 2022 - 12:00 a.m.

CVE-2022-2068

2022-06-2100:00:00
ubuntu.com
ubuntu.com
57

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.085 Low

EPSS

Percentile

94.4%

In addition to the c_rehash shell command injection identified in
CVE-2022-1292, further circumstances where the c_rehash script does not
properly sanitise shell metacharacters to prevent command injection were
found by code review. When the CVE-2022-1292 was fixed it was not
discovered that there are other places in the script where the file names
of certificates being hashed were possibly passed to a command executed
through the shell. This script is distributed by some operating systems in
a manner where it is automatically executed. On such operating systems, an
attacker could execute arbitrary commands with the privileges of the
script. Use of the c_rehash script is considered obsolete and should be
replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4
(Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected
1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

Notes

Author Note
mdeslaur further issues similar to CVE-2022-1292
OSVersionArchitecturePackageVersionFilename
ubuntu16.04noarchedk2< anyUNKNOWN
ubuntu22.04noarchnodejs< 12.22.9~dfsg-1ubuntu3.1UNKNOWN
ubuntu18.04noarchopenssl< 1.1.1-1ubuntu2.1~18.04.19UNKNOWN
ubuntu20.04noarchopenssl< 1.1.1f-1ubuntu2.15UNKNOWN
ubuntu21.10noarchopenssl< 1.1.1l-1ubuntu1.5UNKNOWN
ubuntu22.04noarchopenssl< 3.0.2-0ubuntu1.5UNKNOWN
ubuntu14.04noarchopenssl< anyUNKNOWN
ubuntu16.04noarchopenssl< 1.0.2g-1ubuntu4.20+esm5) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu18.04noarchopenssl1.0< 1.0.2n-1ubuntu5.10UNKNOWN

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.085 Low

EPSS

Percentile

94.4%