#VU68896 Buffer overflow in OpenSSL - CVE-2022-3786

 

#VU68896 Buffer overflow in OpenSSL - CVE-2022-3786

Published: November 1, 2022 / Updated: January 22, 2023


Vulnerability identifier: #VU68896
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Green
CVE-ID: CVE-2022-3786
CWE-ID: CWE-119
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
OpenSSL
Software vendor:
OpenSSL Software Foundation

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when processing the email address field length inside a X.509 certificate. A remote attacker can supply a specially crafted certificate to the application, trigger a buffer overflow and crash the application.



Remediation

Install updates from vendor's website.

External links