Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-3602
HistoryNov 01, 2022 - 12:00 a.m.

CVE-2022-3602

2022-11-0100:00:00
ubuntu.com
ubuntu.com
23

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.062 Low

EPSS

Percentile

93.5%

A buffer overrun can be triggered in X.509 certificate verification,
specifically in name constraint checking. Note that this occurs after
certificate chain signature verification and requires either a CA to have
signed the malicious certificate or for the application to continue
certificate verification despite failure to construct a path to a trusted
issuer. An attacker can craft a malicious email address to overflow four
attacker-controlled bytes on the stack. This buffer overflow could result
in a crash (causing a denial of service) or potentially remote code
execution. Many platforms implement stack overflow protections which would
mitigate against the risk of remote code execution. The risk may be further
mitigated based on stack layout for any given platform/compiler.
Pre-announcements of CVE-2022-3602 described this issue as CRITICAL.
Further analysis based on some of the mitigating factors described above
have led this to be downgraded to HIGH. Users are still encouraged to
upgrade to a new version as soon as possible. In a TLS client, this can be
triggered by connecting to a malicious server. In a TLS server, this can be
triggered if the server requests client authentication and a malicious
client connects. Fixed in OpenSSL 3.0.7 (Affected
3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).

Notes

Author Note
mdeslaur 3.x only Ubuntu packages are built with stack protector, reducing the impact of this CVE from remote code execution to a denial of service.
OSVersionArchitecturePackageVersionFilename
ubuntu16.04noarchedk2< anyUNKNOWN
ubuntu22.04noarchopenssl< 3.0.2-0ubuntu1.7UNKNOWN
ubuntu22.10noarchopenssl< 3.0.5-2ubuntu2UNKNOWN
ubuntu23.04noarchopenssl< 3.0.5-2ubuntu2UNKNOWN
ubuntu23.10noarchopenssl< 3.0.5-2ubuntu2UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.062 Low

EPSS

Percentile

93.5%