A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: OpenSSL(5 tweets)
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
RSaGa2_mimic | https://www.openssl.org/blog/blog/2022/11/01/email-address-... | Source RSaGa2_mimic 1627631651990958080 | 2023/02/20 |
sebaenetworks | https://tinyurl.com/2mj6ohll | Source sebaenetworks 1628104793452425216 | 2023/02/22 |
sebaenetworks | https://twitter.com/sebaenetworks/status/162810479345242521... | Source sebaenetworks 1628104793452425216 | 2023/02/22 |
sebaenetworks | https://tinyurl.com/2gcxca88 | Source sebaenetworks 1628121147068846088 | 2023/02/22 |
sebaenetworks | https://twitter.com/sebaenetworks/status/162812114706884608... | Source sebaenetworks 1628121147068846088 | 2023/02/22 |
CyberIQs_ | http://cyberiqs.com/latestnews | Source CyberIQs_ 1640894905701605382 | 2023/03/29 |
CyberIQs_ | http://cyberiqs.com/latestnews | Source CyberIQs_ 1642315856037261313 | 2023/04/02 |
CyberIQs_ | http://cyberiqs.com/latestnews | Source CyberIQs_ 1644271418660593665 | 2023/04/07 |
List of frequently cited URLs
User | URL | Info Source |
---|---|---|
RSaGa2_mimic | openssl.org | Show Tweet |
sebaenetworks | tinyurl.com | Show Tweet |
sebaenetworks | twitter.com | Show Tweet |
sebaenetworks | tinyurl.com | Show Tweet |
sebaenetworks | twitter.com | Show Tweet |
CyberIQs_ | cyberiqs.com | Show Tweet |
CyberIQs_ | cyberiqs.com | Show Tweet |
CyberIQs_ | cyberiqs.com | Show Tweet |
Name | URL |
---|---|
NCSC-NL/OpenSSL-2022 | https://github.com/NCSC-NL/OpenSSL-2022 |
rbowes-r7/cve-2022-3602-and-cve-2022-3786-openssl-poc | https://github.com/rbowes-r7/cve-2022-3602-and-cve-2022-3786-openssl-poc |
cybersecurityworks553/CVE-2022-3602-and-CVE-2022-3786 | https://github.com/cybersecurityworks553/CVE-2022-3602-and-CVE-2022-3786 |
hi-artem/find-spooky-prismacloud | https://github.com/hi-artem/find-spooky-prismacloud |
micr0sh0ft/certscare-openssl3-exploit | https://github.com/micr0sh0ft/certscare-openssl3-exploit |
Qualys/osslscanwin | https://github.com/Qualys/osslscanwin |
Name | URL |
---|---|
NCSC-NL/OpenSSL-2022 | github.com |
rbowes-r7/cve-2022-3602-and-cve-2022-3786-openssl-poc | github.com |
cybersecurityworks553/CVE-2022-3602-and-CVE-2022-3786 | github.com |
hi-artem/find-spooky-prismacloud | github.com |
micr0sh0ft/certscare-openssl3-exploit | github.com |
Qualys/osslscanwin | github.com |