Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-3358
HistoryOct 11, 2022 - 12:00 a.m.

CVE-2022-3358

2022-10-1100:00:00
ubuntu.com
ubuntu.com
13

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

42.3%

OpenSSL supports creating a custom cipher via the legacy
EVP_CIPHER_meth_new() function and associated function calls. This function
was deprecated in OpenSSL 3.0 and application authors are instead
encouraged to use the new provider mechanism in order to implement custom
ciphers. OpenSSL versions 3.0.0 to 3.0.5 incorrectly handle legacy custom
ciphers passed to the EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() and
EVP_CipherInit_ex2() functions (as well as other similarly named encryption
and decryption initialisation functions). Instead of using the custom
cipher directly it incorrectly tries to fetch an equivalent cipher from the
available providers. An equivalent cipher is found based on the NID passed
to EVP_CIPHER_meth_new(). This NID is supposed to represent the unique NID
for a given cipher. However it is possible for an application to
incorrectly pass NID_undef as this value in the call to
EVP_CIPHER_meth_new(). When NID_undef is used in this way the OpenSSL
encryption/decryption initialisation function will match the NULL cipher as
being equivalent and will fetch this from the available providers. This
will succeed if the default provider has been loaded (or if a third party
provider has been loaded that offers this cipher). Using the NULL cipher
means that the plaintext is emitted as the ciphertext. Applications are
only affected by this issue if they call EVP_CIPHER_meth_new() using
NID_undef and subsequently use it in a call to an encryption/decryption
initialisation function. Applications that only use SSL/TLS are not
impacted by this issue. Fixed in OpenSSL 3.0.6 (Affected 3.0.0-3.0.5).

Bugs

Notes

Author Note
mdeslaur 3.x only
OSVersionArchitecturePackageVersionFilename
ubuntu16.04noarchedk2< anyUNKNOWN
ubuntu22.04noarchopenssl< 3.0.2-0ubuntu1.7UNKNOWN
ubuntu22.10noarchopenssl< 3.0.5-2ubuntu2UNKNOWN
ubuntu23.04noarchopenssl< 3.0.5-2ubuntu2UNKNOWN
ubuntu23.10noarchopenssl< 3.0.5-2ubuntu2UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

42.3%