7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
libressl is vulnerable to denial of service. The vulnerability exists due to a bug in the BN_mod_sqrt() function which goes into an infinite loop which then causes an application crash.
packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
seclists.org/fulldisclosure/2022/May/33
seclists.org/fulldisclosure/2022/May/35
seclists.org/fulldisclosure/2022/May/38
cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
lists.debian.org/debian-lts-announce/2022/03/msg00023.html
lists.debian.org/debian-lts-announce/2022/03/msg00024.html
lists.fedoraproject.org/archives/list/[email protected]/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
lists.fedoraproject.org/archives/list/[email protected]/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
lists.fedoraproject.org/archives/list/[email protected]/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
secdb.alpinelinux.org/edge/community.yaml
secdb.alpinelinux.org/edge/main.yaml
secdb.alpinelinux.org/v3.12/main.yaml
secdb.alpinelinux.org/v3.13/main.yaml
secdb.alpinelinux.org/v3.14/community.yaml
secdb.alpinelinux.org/v3.14/main.yaml
secdb.alpinelinux.org/v3.15/community.yaml
secdb.alpinelinux.org/v3.15/main.yaml
security.gentoo.org/glsa/202210-02
security.netapp.com/advisory/ntap-20220321-0002/
security.netapp.com/advisory/ntap-20220429-0005/
support.apple.com/kb/HT213255
support.apple.com/kb/HT213256
support.apple.com/kb/HT213257
www.debian.org/security/2022/dsa-5103
www.openssl.org/news/secadv/20220315.txt
www.oracle.com/security-alerts/cpuapr2022.html
www.oracle.com/security-alerts/cpujul2022.html
www.tenable.com/security/tns-2022-06
www.tenable.com/security/tns-2022-07
www.tenable.com/security/tns-2022-08
www.tenable.com/security/tns-2022-09
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P