CVE-2022-3786

Description from NVD

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.

Information Acquisition Date:2022-11-08T14:58Z
CVSS 2.0: 0.0 None CVSS 3.x: 7.5 HIGH

▼ CVSS3 Vec CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

NVD References

 https://www.openssl.org/news/secadv/20221101.txt
     source:CONFIRM
     tags:Vendor Advisory    
 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c42165b5706e42f67ef8ef4c351a9a4c5d21639a
     source:MISC
     tags:

This vulnerability may involve a PoC.

Refer to Information on External Sites

CVE InfomationExploits or more Infomation
mitreEXPLOIT DATABASE
NVD0day.today
vulmon.comgithub
CVE DetailsTwitter
JVN ENG JPN
Reconshell

Software Tag: Apple(1 tweets) BIG-IP(1 tweets) Exchange(1 tweets) Java(1 tweets) Linux(11 tweets) OpenSSL(640 tweets) PHP(1 tweets) Unix(1 tweets) VMware(29 tweets) VPN(1 tweets) Windows(5 tweets) iOS(7 tweets)



List of frequently cited URLs

URLNum of Times Referred to
https://lnkd130
https://www.openssl.org/news/cl30.txt129
https://cvetrends.com49
https://github.com/openssl/openssl/commit/c42165b5706e42f67...37
https://lists.astaro.com/ASGV9-IPS-rules.html#020
https://nakedsecurity.sophos.com/19
https://blogs.vmware.com/security/2022/11/vmware-response-t...16
https://www.jpcert.or.jp/at/2022/at220030.html11
https://www.ipa.go.jp/security/ciadr/vul/alert20221102.html10
https://twitter.com/TheHackersNews/status/15874811937205985339
https://www.snort.org/downloads7
https://www.splunk.com/en_us/blog/security/nothing-puny-abo...7
https://news.google.com/__i/rss/rd/articles/CBMicGh0dHBzOi8...7
https://blog.cloudflare.com/cloudflare-is-not-affected-by-t...7
https://security.sios.com/vulnerability/openssl-security-vu...6
https://thehackernews.com/2022/11/just-in-openssl-releases-...6
https://news.ycombinator.com/item?id=334232716
https://opsmtrs.com/3fTgB6p5
https://www.rapid7.com/blog/post/2022/11/01/cve-2022-3786-a...5
https://securityboulevard.com/2022/11/what-the-openssl-vuln...5
https://rssfeeds.cloudsite.builders/2022/11/02/cve-2022-360...5
https://b.hatena.ne.jp/entry/s/www.openssl.org/blog/blog/20...4
https://tweetedtimes.com/seclabor?s=tnp4
https://msrc-blog.microsoft.com/2022/11/02/microsoft-guidan...4
https://www.helpnetsecurity.com/2022/11/01/high-severity-op...4
https://security-tracker.debian.org/tracker/CVE-2022-36024
http://ow.ly/zvz750LsE0K3
https://xtra.li/3heHVQc3
https://cve.report/CVE-2022-37863
https://sysdig.com/blog/stop-openssl-vulnerability-cve-37863
https://ubuntu.com/security/CVE-2022-36023
http://openssl.org3
https://www.cve.org/CVERecord?id=CVE-2022-37863
https://isc.sans.edu/diary/rss/292083
http://Checkmarx.com3
https://go.trellix.com/3UbKHnk3
https://mta.openssl.org/pipermail/openssl-announce/2022-Nov...3
https://access.redhat.com/security/vulnerabilities/RHSB-202...3
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-...3
https://blog.checkpoint.com/2022/11/01/openssl-vulnerabilit...3
https://www.bleepingcomputer.com/news/security/openssl-fixe...3
https://unit42.paloaltonetworks.com/openssl-vulnerabilities3

▼ Show Information from Twitter(857)


List of frequently cited URLs

URLNum of Times Referred to
lnkd130
www.openssl.org129
cvetrends.com49
github.com37
lists.astaro.com20
nakedsecurity.sophos.com19
blogs.vmware.com16
www.jpcert.or.jp11
www.ipa.go.jp10
twitter.com9
www.snort.org7
www.splunk.com7
news.google.com7
blog.cloudflare.com7
security.sios.com6
thehackernews.com6
news.ycombinator.com6
opsmtrs.com5
www.rapid7.com5
securityboulevard.com5
rssfeeds.cloudsite.builders5
b.hatena.ne.jp4
tweetedtimes.com4
msrc-blog.microsoft.com4
www.helpnetsecurity.com4
security-tracker.debian.org4
ow.ly3
xtra.li3
cve.report3
sysdig.com3
ubuntu.com3
openssl.org3
www.cve.org3
isc.sans.edu3
Checkmarx.com3
go.trellix.com3
mta.openssl.org3
access.redhat.com3
www.trustwave.com3
blog.checkpoint.com3
www.bleepingcomputer.com3
unit42.paloaltonetworks.com3

▼ Show Information from Twitter(857)


GitHub Search Results: Up to 10
NameURL
NCSC-NL/OpenSSL-2022 https://github.com/NCSC-NL/OpenSSL-2022
rbowes-r7/cve-2022-3602-and-cve-2022-3786-openssl-poc https://github.com/rbowes-r7/cve-2022-3602-and-cve-2022-3786-openssl-poc
cybersecurityworks553/CVE-2022-3602-and-CVE-2022-3786 https://github.com/cybersecurityworks553/CVE-2022-3602-and-CVE-2022-3786
hi-artem/find-spooky-prismacloud https://github.com/hi-artem/find-spooky-prismacloud
micr0sh0ft/certscare-openssl3-exploit https://github.com/micr0sh0ft/certscare-openssl3-exploit
Qualys/osslscanwin https://github.com/Qualys/osslscanwin

GitHub Search Results: Up to 10
NameURL
NCSC-NL/OpenSSL-2022 github.com
rbowes-r7/cve-2022-3602-and-cve-2022-3786-openssl-poc github.com
cybersecurityworks553/CVE-2022-3602-and-CVE-2022-3786 github.com
hi-artem/find-spooky-prismacloud github.com
micr0sh0ft/certscare-openssl3-exploit github.com
Qualys/osslscanwin github.com

2022/12/02 Score : 0
Added Har-sia Database : 2022/11/02
Last Modified : 2022/12/02
Highest Scored Date : 2022/11/02
Highest Score : 500