9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.085 Low
EPSS
Percentile
94.4%
In addition to the c_rehash shell command injection identified in
CVE-2022-1292, further circumstances where the c_rehash script does not
properly sanitise shell metacharacters to prevent command injection were
found by code review. When the CVE-2022-1292 was fixed it was not
discovered that there are other places in the script where the file names
of certificates being hashed were possibly passed to a command executed
through the shell. This script is distributed by some operating systems in
a manner where it is automatically executed. On such operating systems, an
attacker could execute arbitrary commands with the privileges of the
script. Use of the c_rehash script is considered obsolete and should be
replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4
(Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected
1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).
Author | Note |
---|---|
mdeslaur | further issues similar to CVE-2022-1292 |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 16.04 | noarch | edk2 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | nodejs | < 12.22.9~dfsg-1ubuntu3.1 | UNKNOWN |
ubuntu | 18.04 | noarch | openssl | < 1.1.1-1ubuntu2.1~18.04.19 | UNKNOWN |
ubuntu | 20.04 | noarch | openssl | < 1.1.1f-1ubuntu2.15 | UNKNOWN |
ubuntu | 21.10 | noarch | openssl | < 1.1.1l-1ubuntu1.5 | UNKNOWN |
ubuntu | 22.04 | noarch | openssl | < 3.0.2-0ubuntu1.5 | UNKNOWN |
ubuntu | 14.04 | noarch | openssl | < any | UNKNOWN |
ubuntu | 16.04 | noarch | openssl | < 1.0.2g-1ubuntu4.20+esm5) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 18.04 | noarch | openssl1.0 | < 1.0.2n-1ubuntu5.10 | UNKNOWN |
launchpad.net/bugs/cve/CVE-2022-2068
nvd.nist.gov/vuln/detail/CVE-2022-2068
security-tracker.debian.org/tracker/CVE-2022-2068
ubuntu.com/security/notices/USN-5488-1
ubuntu.com/security/notices/USN-5488-2
ubuntu.com/security/notices/USN-6457-1
www.cve.org/CVERecord?id=CVE-2022-2068
www.openssl.org/news/secadv/20220621.txt
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.085 Low
EPSS
Percentile
94.4%