Action not permitted
Modal body text goes here.
cve-2022-3602
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:14:02.712Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.openssl.org/news/secadv/20221101.txt" }, { "tags": [ "x_transferred" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fe3b639dc19b325846f4f6801f2f4604f56e3de3" }, { "name": "[oss-security] 20221101 OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/15" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/16" }, { "name": "20221028 Vulnerabilities in OpenSSL Affecting Cisco Products: November 2022", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-W9sdCc2a" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/21" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/19" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/18" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/20" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/24" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/17" }, { "name": "GLSA-202211-01", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202211-01" }, { "tags": [ "x_transferred" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0023" }, { "name": "VU#794340", "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/794340" }, { "name": "FEDORA-2022-0f1d2e0537", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITS/" }, { "name": "FEDORA-2022-502f096dce", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6S/" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/2" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/6" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/5" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/1" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/3" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/7" }, { "name": "[oss-security] 20221102 Re: Fwd: Node.js security updates for all active release lines, November 2022", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/10" }, { "name": "[oss-security] 20221102 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/9" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/169687/OpenSSL-Security-Advisory-20221101.html" }, { "name": "[oss-security] 20221102 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/12" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/11" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/15" }, { "name": "[oss-security] 20221102 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/14" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/13" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20221102-0001/" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/1" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/2" }, { "name": "[oss-security] 20221103 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/3" }, { "name": "[oss-security] 20221103 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/5" }, { "name": "[oss-security] 20221103 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/7" }, { "name": "[oss-security] 20221103 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/6" }, { "name": "[oss-security] 20221103 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/9" }, { "name": "[oss-security] 20221103 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/10" }, { "name": "[oss-security] 20221103 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/11" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpenSSL", "vendor": "OpenSSL", "versions": [ { "status": "affected", "version": "Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6)" } ] } ], "credits": [ { "lang": "en", "value": "Polar Bear" } ], "datePublic": "2022-11-01T00:00:00", "descriptions": [ { "lang": "en", "value": "A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6)." } ], "metrics": [ { "other": { "content": { "lang": "eng", "url": "https://www.openssl.org/policies/secpolicy.html#HIGH", "value": "HIGH" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-03T00:00:00", "orgId": "3a12439a-ef3a-4c79-92e6-6081a721f1e5", "shortName": "openssl" }, "references": [ { "url": "https://www.openssl.org/news/secadv/20221101.txt" }, { "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fe3b639dc19b325846f4f6801f2f4604f56e3de3" }, { "name": "[oss-security] 20221101 OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/15" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/16" }, { "name": "20221028 Vulnerabilities in OpenSSL Affecting Cisco Products: November 2022", "tags": [ "vendor-advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-W9sdCc2a" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/21" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/19" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/18" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/20" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/24" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/17" }, { "name": "GLSA-202211-01", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202211-01" }, { "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0023" }, { "name": "VU#794340", "tags": [ "third-party-advisory" ], "url": "https://www.kb.cert.org/vuls/id/794340" }, { "name": "FEDORA-2022-0f1d2e0537", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITS/" }, { "name": "FEDORA-2022-502f096dce", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6S/" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/2" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/6" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/5" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/1" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/3" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/7" }, { "name": "[oss-security] 20221102 Re: Fwd: Node.js security updates for all active release lines, November 2022", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/10" }, { "name": "[oss-security] 20221102 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/9" }, { "url": "http://packetstormsecurity.com/files/169687/OpenSSL-Security-Advisory-20221101.html" }, { "name": "[oss-security] 20221102 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/12" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/11" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/15" }, { "name": "[oss-security] 20221102 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/14" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/13" }, { "url": "https://security.netapp.com/advisory/ntap-20221102-0001/" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/1" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/2" }, { "name": "[oss-security] 20221103 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/3" }, { "name": "[oss-security] 20221103 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/5" }, { "name": "[oss-security] 20221103 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/7" }, { "name": "[oss-security] 20221103 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/6" }, { "name": "[oss-security] 20221103 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/9" }, { "name": "[oss-security] 20221103 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/10" }, { "name": "[oss-security] 20221103 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/11" } ], "title": "X.509 Email Address 4-byte Buffer Overflow" } }, "cveMetadata": { "assignerOrgId": "3a12439a-ef3a-4c79-92e6-6081a721f1e5", "assignerShortName": "openssl", "cveId": "CVE-2022-3602", "datePublished": "2022-11-01T00:00:00", "dateReserved": "2022-10-19T00:00:00", "dateUpdated": "2024-08-03T01:14:02.712Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-3602\",\"sourceIdentifier\":\"openssl-security@openssl.org\",\"published\":\"2022-11-01T18:15:10.983\",\"lastModified\":\"2023-08-08T14:21:49.707\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).\"},{\"lang\":\"es\",\"value\":\"Puede activarse una saturaci\u00f3n del b\u00fafer en la verificaci\u00f3n del certificado X.509, espec\u00edficamente en la verificaci\u00f3n de restricciones en el nombre. Tenga en cuenta que esto ocurre despu\u00e9s de la verificaci\u00f3n de la firma de la cadena de certificados y requiere que una CA haya firmado el certificado malicioso o que la aplicaci\u00f3n contin\u00fae con la verificaci\u00f3n del certificado a pesar de no poder construir una ruta a un emisor confiable. Un atacante puede crear una direcci\u00f3n de correo electr\u00f3nico maliciosa para desbordar cuatro bytes en la pila de memoria controlados por el atacante. Este desbordamiento del b\u00fafer podr\u00eda provocar un bloqueo (provocando una denegaci\u00f3n de servicio) o una potencial ejecuci\u00f3n remota de c\u00f3digo. Muchas plataformas implementan protecciones contra el desbordamiento de la pila de memoria que mitigar\u00edan el riesgo de ejecuci\u00f3n remota de c\u00f3digo. El riesgo puede mitigarse, a\u00fan m\u00e1s, seg\u00fan el dise\u00f1o de la pila de memoria para cualquier plataforma/compilador determinado. Los anuncios previos de CVE-2022-3602 describieron este problema como CR\u00cdTICO. Un an\u00e1lisis m\u00e1s detallado basado en algunos de los factores mitigantes descritos anteriormente ha llevado a que esto se rebaje a ALTO. A\u00fan se recomienda a los usuarios que actualicen a una nueva versi\u00f3n lo antes posible. En un cliente TLS, esto se puede desencadenar conect\u00e1ndose a un servidor malicioso. En un servidor TLS, esto se puede activar si el servidor solicita la autenticaci\u00f3n del cliente y se conecta un cliente malintencionado. Corregido en OpenSSL 3.0.7 (Afectado 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0.0\",\"versionEndExcluding\":\"3.0.7\",\"matchCriteriaId\":\"BE1F59CA-02F2-4374-A129-18713496B58B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30D0E6F-4AE8-4284-8716-991DFA48CC5D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FE996B1-6951-4F85-AA58-B99A379D2163\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E4D8269-B407-4C24-AAB0-02F885C7D752\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBEACBFF-6D05-4B69-BF7A-F7E539D9BF6E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"18.0.0\",\"versionEndExcluding\":\"18.11.0\",\"matchCriteriaId\":\"CAC42CA8-8B01-4A19-A83C-A7D4D08E5E43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:18.12.0:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"7B1F87EE-4E30-4832-BF01-8501E94380EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:19.0.0:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"F568BBC5-0D8E-499C-9F3E-DDCE5F10F9D5\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/169687/OpenSSL-Security-Advisory-20221101.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/01/15\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/01/16\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/01/17\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/01/18\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/01/19\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/01/20\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/01/21\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/01/24\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/02/1\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/02/10\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/02/11\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/02/12\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/02/13\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/02/14\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/02/15\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/02/2\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/02/3\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/02/5\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/02/6\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/02/7\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/02/9\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/03/1\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/03/10\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/03/11\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/03/2\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/03/3\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/03/5\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/03/6\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/03/7\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/03/9\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fe3b639dc19b325846f4f6801f2f4604f56e3de3\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6S/\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITS/\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0023\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202211-01\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20221102-0001/\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-W9sdCc2a\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/794340\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.openssl.org/news/secadv/20221101.txt\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
icsa-23-019-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Hitachi Energy", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could result in a denial-of-service condition on both the logging function of the device and its associated server.", "title": "Risk evaluation" }, { "category": "other", "text": " Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": " Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": " Switzerland", "title": "Company headquarters location" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-23-019-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-019-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-23-019-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-019-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" } ], "title": "Hitachi Energy PCU400", "tracking": { "current_release_date": "2023-01-19T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-23-019-01", "initial_release_date": "2023-01-19T00:00:00.000000Z", "revision_history": [ { "date": "2023-01-19T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Publication Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e= 9.3.0 - but not including 9.3.8", "product": { "name": "PCU400: PCU400: Versions 9.3.0 and later up to but not including 9.3.8", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "PCU400" }, { "branches": [ { "category": "product_version", "name": "1.0.1", "product": { "name": "PCU400: PCULogger tool: Version 1.0.1", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "PCULogger tool" } ], "category": "vendor", "name": "Hitachi Energy" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-3602", "cwe": { "id": "CWE-1357", "name": "Reliance on Insufficiently Trustworthy Component" }, "notes": [ { "category": "summary", "text": "The affected versions of PCU400 rely on a version of OpenSSL that contains a buffer overflow vulnerability. A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. In PCU400, this vulnerability could be exploited if a malicious TLS certificate is used to secure communication between PCU400 and PCULogger. Successful exploitation may cause a denial-of-service of the PCU400 Logger and PCUCAG server.- Note: the issue is related to logging with the PCULogger tool. Otherwise, the PCU system is not impacted.-CVE-2022-3602 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3602" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy has fixed the vulnerabilities in the following versions, and recommends users update their systems to the appropriate version:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "PCU400: Version 9.3.8 or 9.4 or later", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "PCULogger: Version 1.1.0 or later", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Users should contact a Hitachi Energy representative for instructions on acquiring and installing the new versions.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Hitachi Energy encourages users to apply recommended security practices and firewall configurations. These practices include, but are not limited to:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Protect process control systems from physical access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Do not allow process control systems to have direct connections to the Internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Apply security updates to installed software components.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Do not use process control systems for personal use, such as web browsing or checking emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Carefully scan portable computers and removable storage media for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy advisory 8DBD000137.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000137\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2022-3786", "cwe": { "id": "CWE-1357", "name": "Reliance on Insufficiently Trustworthy Component" }, "notes": [ { "category": "summary", "text": "The affected versions of PCU400 rely on a version of OpenSSL that contains a buffer overflow vulnerability. A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. In PCU400, this vulnerability could be exploited if a malicious TLS certificate is used to secure communication between PCU400 and PCULogger. Successful exploitation may cause a denial-of-service of the PCU400 Logger and PCUCAG server. - Note: the issue is related to logging with the PCULogger tool. Otherwise, the PCU system is not impacted.-CVE-2022-3786 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3786" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy has fixed the vulnerabilities in the following versions, and recommends users update their systems to the appropriate version:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "PCU400: Version 9.3.8 or 9.4 or later", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "PCULogger: Version 1.1.0 or later", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Users should contact a Hitachi Energy representative for instructions on acquiring and installing the new versions.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Hitachi Energy encourages users to apply recommended security practices and firewall configurations. These practices include, but are not limited to:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Protect process control systems from physical access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Do not allow process control systems to have direct connections to the Internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Apply security updates to installed software components.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Do not use process control systems for personal use, such as web browsing or checking emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Carefully scan portable computers and removable storage media for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy advisory 8DBD000137.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000137\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] } ] }
icsa-22-349-12
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Mat Powell" ], "organization": "Trend Micro Zero Day Initiative", "summary": "reporting these vulnerabilities to Siemens" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an attacker to execute code in the context of the current process.", "title": "Risk evaluation" }, { "category": "other", "text": " Critical Manufacturing ", "title": "Critical infrastructure sectors" }, { "category": "other", "text": " Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": " Germany", "title": "Company headquarters location" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens operational guidelines for industrial security and to follow the recommendations in the product manuals.\nFor more information, see the associated Siemens security advisory SSA-408105 in HTML and CSAF.\nCISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities. These vulnerabilities are not exploitable remotely.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "Recommended Practices", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-408105.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-349-12 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-349-12.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-349-12 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-12" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-408105.html" }, { "category": "external", "summary": "SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-408105.json" }, { "category": "external", "summary": "SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-408105.pdf" }, { "category": "external", "summary": "SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-408105.txt" } ], "title": "Siemens Parasolid", "tracking": { "current_release_date": "2022-12-15T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-349-12", "initial_release_date": "2022-12-15T00:00:00.000000Z", "revision_history": [ { "date": "2022-12-15T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Publication Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V2022.4\u003cV2023.1", "product": { "name": "Calibre ICE", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Calibre ICE" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V5.2.1.0", "product": { "name": "Mcenter", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Mcenter" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V3.2.7", "product": { "name": "SCALANCE X-200RNA switch family", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "SCALANCE X-200RNA switch family" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V1.80\u003cV2.20", "product": { "name": "SICAM GridPass (6MD7711-2AA00-1EA0)", "product_id": "CSAFPID-0004", "product_identification_helper": { "model_numbers": [ "6MD7711-2AA00-1EA0" ] } } } ], "category": "product_name", "name": "SICAM GridPass (6MD7711-2AA00-1EA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V2.13", "product": { "name": "SIMATIC RTLS Locating Manager (6GT2780-0DA00)", "product_id": "CSAFPID-0005", "product_identification_helper": { "model_numbers": [ "6GT2780-0DA00" ] } } } ], "category": "product_name", "name": "SIMATIC RTLS Locating Manager (6GT2780-0DA00)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-3602", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Siemens products that contain a vulnerable TLS server and have certificate-based client authentication enabled: do not configure trust for CA certificates, that contain a nameConstraint-extension (https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Siemens products that contain a vulnerable TLS client: in cases where this option is configurable: ensure that TLS server certificate verification is turned on and do not configure trust for CA certificates, that contain a nameConstraint-extension (https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "As a mitigation for vulnerable versions: In the truststore, do not add CA certificates that contain a nameConstraint-extension (\nhttps://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0004" ] }, { "category": "mitigation", "details": "Ensure that only trusted (CA) certificates are contained in the Machine Agent\u0027s truststore", "product_ids": [ "CSAFPID-0002" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V2.20 or later version", "product_ids": [ "CSAFPID-0004" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109763384/" }, { "category": "vendor_fix", "details": "Update to V2023.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.sw.siemens.com/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-3602" }, { "cve": "CVE-2022-3786", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.\u0027 character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Siemens products that contain a vulnerable TLS server and have certificate-based client authentication enabled: do not configure trust for CA certificates, that contain a nameConstraint-extension (https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Siemens products that contain a vulnerable TLS client: in cases where this option is configurable: ensure that TLS server certificate verification is turned on and do not configure trust for CA certificates, that contain a nameConstraint-extension (https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "As a mitigation for vulnerable versions: In the truststore, do not add CA certificates that contain a nameConstraint-extension (\nhttps://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0004" ] }, { "category": "mitigation", "details": "Ensure that only trusted (CA) certificates are contained in the Machine Agent\u0027s truststore", "product_ids": [ "CSAFPID-0002" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V2.20 or later version", "product_ids": [ "CSAFPID-0004" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109763384/" }, { "category": "vendor_fix", "details": "Update to V2023.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.sw.siemens.com/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-3786" } ] }
icsa-22-349-10
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of this vulnerability could allow an attacker to hijack existing sessions or spoof future sessions.", "title": "Risk evaluation" }, { "category": "other", "text": " Critical Manufacturing ", "title": "Critical infrastructure sectors" }, { "category": "other", "text": " Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": " Germany", "title": "Company headquarters location" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens operational guidelines for industrial security and to follow the recommendations in the product manuals.\nFor more information, see the associated Siemens security advisory SSA-408105 in HTML and CSAF.\nCISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "No known public exploits specifically target this vulnerability.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "Recommended Practices", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-408105.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-349-10 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-349-10.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-349-10 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-10" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-408105.html" }, { "category": "external", "summary": "SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-408105.json" }, { "category": "external", "summary": "SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-408105.pdf" }, { "category": "external", "summary": "SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-408105.txt" } ], "title": "Siemens APOGEE/TALON Field Panels", "tracking": { "current_release_date": "2022-12-15T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-349-10", "initial_release_date": "2022-12-15T00:00:00.000000Z", "revision_history": [ { "date": "2022-12-15T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Publication Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V2022.4\u003cV2023.1", "product": { "name": "Calibre ICE", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Calibre ICE" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V5.2.1.0", "product": { "name": "Mcenter", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Mcenter" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V3.2.7", "product": { "name": "SCALANCE X-200RNA switch family", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "SCALANCE X-200RNA switch family" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V1.80\u003cV2.20", "product": { "name": "SICAM GridPass (6MD7711-2AA00-1EA0)", "product_id": "CSAFPID-0004", "product_identification_helper": { "model_numbers": [ "6MD7711-2AA00-1EA0" ] } } } ], "category": "product_name", "name": "SICAM GridPass (6MD7711-2AA00-1EA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V2.13", "product": { "name": "SIMATIC RTLS Locating Manager (6GT2780-0DA00)", "product_id": "CSAFPID-0005", "product_identification_helper": { "model_numbers": [ "6GT2780-0DA00" ] } } } ], "category": "product_name", "name": "SIMATIC RTLS Locating Manager (6GT2780-0DA00)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-3602", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Siemens products that contain a vulnerable TLS server and have certificate-based client authentication enabled: do not configure trust for CA certificates, that contain a nameConstraint-extension (https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Siemens products that contain a vulnerable TLS client: in cases where this option is configurable: ensure that TLS server certificate verification is turned on and do not configure trust for CA certificates, that contain a nameConstraint-extension (https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "As a mitigation for vulnerable versions: In the truststore, do not add CA certificates that contain a nameConstraint-extension (\nhttps://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0004" ] }, { "category": "mitigation", "details": "Ensure that only trusted (CA) certificates are contained in the Machine Agent\u0027s truststore", "product_ids": [ "CSAFPID-0002" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V2.20 or later version", "product_ids": [ "CSAFPID-0004" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109763384/" }, { "category": "vendor_fix", "details": "Update to V2023.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.sw.siemens.com/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-3602" }, { "cve": "CVE-2022-3786", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.\u0027 character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Siemens products that contain a vulnerable TLS server and have certificate-based client authentication enabled: do not configure trust for CA certificates, that contain a nameConstraint-extension (https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Siemens products that contain a vulnerable TLS client: in cases where this option is configurable: ensure that TLS server certificate verification is turned on and do not configure trust for CA certificates, that contain a nameConstraint-extension (https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "As a mitigation for vulnerable versions: In the truststore, do not add CA certificates that contain a nameConstraint-extension (\nhttps://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0004" ] }, { "category": "mitigation", "details": "Ensure that only trusted (CA) certificates are contained in the Machine Agent\u0027s truststore", "product_ids": [ "CSAFPID-0002" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V2.20 or later version", "product_ids": [ "CSAFPID-0004" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109763384/" }, { "category": "vendor_fix", "details": "Update to V2023.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.sw.siemens.com/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-3786" } ] }
icsa-22-349-11
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of this vulnerability could allow an attacker to create a denial-of-service condition on ports 443/TCP and 4443/TCP for a duration.", "title": "Risk evaluation" }, { "category": "other", "text": " Critical Manufacturing ", "title": "Critical infrastructure sectors" }, { "category": "other", "text": " Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": " Germany", "title": "Company headquarters location" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens operational guidelines for industrial security and to follow the recommendations in the product manuals.\nFor more information, see the associated Siemens security advisory SSA-408105 in HTML and CSAF.\nCISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "No known public exploits specifically target this vulnerability.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "Recommended Practices", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-408105.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-349-11 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-349-11.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-349-11 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-11" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-408105.html" }, { "category": "external", "summary": "SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-408105.json" }, { "category": "external", "summary": "SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-408105.pdf" }, { "category": "external", "summary": "SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-408105.txt" } ], "title": "Siemens SIPROTEC 5 Devices", "tracking": { "current_release_date": "2022-12-15T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-349-11", "initial_release_date": "2022-12-15T00:00:00.000000Z", "revision_history": [ { "date": "2022-12-15T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Publication Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V2022.4\u003cV2023.1", "product": { "name": "Calibre ICE", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Calibre ICE" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V5.2.1.0", "product": { "name": "Mcenter", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Mcenter" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V3.2.7", "product": { "name": "SCALANCE X-200RNA switch family", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "SCALANCE X-200RNA switch family" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V1.80\u003cV2.20", "product": { "name": "SICAM GridPass (6MD7711-2AA00-1EA0)", "product_id": "CSAFPID-0004", "product_identification_helper": { "model_numbers": [ "6MD7711-2AA00-1EA0" ] } } } ], "category": "product_name", "name": "SICAM GridPass (6MD7711-2AA00-1EA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V2.13", "product": { "name": "SIMATIC RTLS Locating Manager (6GT2780-0DA00)", "product_id": "CSAFPID-0005", "product_identification_helper": { "model_numbers": [ "6GT2780-0DA00" ] } } } ], "category": "product_name", "name": "SIMATIC RTLS Locating Manager (6GT2780-0DA00)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-3602", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Siemens products that contain a vulnerable TLS server and have certificate-based client authentication enabled: do not configure trust for CA certificates, that contain a nameConstraint-extension (https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Siemens products that contain a vulnerable TLS client: in cases where this option is configurable: ensure that TLS server certificate verification is turned on and do not configure trust for CA certificates, that contain a nameConstraint-extension (https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "As a mitigation for vulnerable versions: In the truststore, do not add CA certificates that contain a nameConstraint-extension (\nhttps://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0004" ] }, { "category": "mitigation", "details": "Ensure that only trusted (CA) certificates are contained in the Machine Agent\u0027s truststore", "product_ids": [ "CSAFPID-0002" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V2.20 or later version", "product_ids": [ "CSAFPID-0004" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109763384/" }, { "category": "vendor_fix", "details": "Update to V2023.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.sw.siemens.com/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-3602" }, { "cve": "CVE-2022-3786", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.\u0027 character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Siemens products that contain a vulnerable TLS server and have certificate-based client authentication enabled: do not configure trust for CA certificates, that contain a nameConstraint-extension (https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Siemens products that contain a vulnerable TLS client: in cases where this option is configurable: ensure that TLS server certificate verification is turned on and do not configure trust for CA certificates, that contain a nameConstraint-extension (https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "As a mitigation for vulnerable versions: In the truststore, do not add CA certificates that contain a nameConstraint-extension (\nhttps://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0004" ] }, { "category": "mitigation", "details": "Ensure that only trusted (CA) certificates are contained in the Machine Agent\u0027s truststore", "product_ids": [ "CSAFPID-0002" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V2.20 or later version", "product_ids": [ "CSAFPID-0004" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109763384/" }, { "category": "vendor_fix", "details": "Update to V2023.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.sw.siemens.com/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-3786" } ] }
icsa-23-229-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "ICONICS", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could result in information disclosure, denial-of-service, or remote code execution.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "ICONICS is headquartered in the United States. Mitsubishi Electric is headquartered in Japan.", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-23-229-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-229-01.json" }, { "category": "self", "summary": "ICSA Advisory ICSA-23-229-01 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-229-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "ICONICS and Mitsubishi Electric Products", "tracking": { "current_release_date": "2023-08-17T06:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-23-229-01", "initial_release_date": "2023-08-17T06:00:00.000000Z", "revision_history": [ { "date": "2023-08-17T06:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Initial Publication" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "10.97.2", "product": { "name": "ICONICS Suite including GENESIS64, Hyper Historian, AnalytiX, and MobileHMI: 10.97.2", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "ICONICS Suite including GENESIS64, Hyper Historian, AnalytiX, and MobileHMI" } ], "category": "vendor", "name": "ICONICS, Mitsubishi Electric" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-3602", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "A denial of service and potential crash vulnerability due to a buffer overrun condition exists in the OpenSSL library used in the ICONICS Suite. This vulnerability is in the X.509 certificate name constraint checking.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3602" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Version 10.97.2 Critical Fixes Rollup 2 and later is not vulnerable to these exploits. ICONICS recommends that users of its products take the following mitigation steps:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Ensure the 10.97.2 Critical Fixes Rollup release is applied to version 10.97.2 systems.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For systems that do not contain the patch/fix:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Do not use the BACnet/SC feature on a production system.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "ICONICS and Mitsubishi Electric recommend updating the ICONICS Suite with the latest security patches as they become available. ICONICS Suite security patches may be found here (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://partners.iconics.com/Home.aspx" }, { "category": "mitigation", "details": "ICONICS and Mitsubishi Electric are releasing security updates as critical fixes/rollups release. For more information, refer to the ICONICS whitepaper on security vulnerabilities, the most recent version of which can be found here.", "product_ids": [ "CSAFPID-0001" ], "url": "https://iconics.com/About/Security/CERT" }, { "category": "mitigation", "details": "Additional information about the security updates may also be found in Mitsubishi Electric\u0027s security advisories:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Advisory 2022-014", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-014_en.pdf" }, { "category": "mitigation", "details": "Advisory 2023-009", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-009_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-3786", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "A denial-of-service vulnerability due to a buffer overrun condition exists in the OpenSSL library used in the ICONICS Suite. This vulnerability is in the X.509 certificate verification.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3786" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Version 10.97.2 Critical Fixes Rollup 2 and later is not vulnerable to these exploits. ICONICS recommends that users of its products take the following mitigation steps:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Ensure the 10.97.2 Critical Fixes Rollup release is applied to version 10.97.2 systems.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For systems that do not contain the patch/fix:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Do not use the BACnet/SC feature on a production system.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "ICONICS and Mitsubishi Electric recommend updating the ICONICS Suite with the latest security patches as they become available. ICONICS Suite security patches may be found here (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://partners.iconics.com/Home.aspx" }, { "category": "mitigation", "details": "ICONICS and Mitsubishi Electric are releasing security updates as critical fixes/rollups release. For more information, refer to the ICONICS whitepaper on security vulnerabilities, the most recent version of which can be found here.", "product_ids": [ "CSAFPID-0001" ], "url": "https://iconics.com/About/Security/CERT" }, { "category": "mitigation", "details": "Additional information about the security updates may also be found in Mitsubishi Electric\u0027s security advisories:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Advisory 2022-014", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-014_en.pdf" }, { "category": "mitigation", "details": "Advisory 2023-009", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-009_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-4203", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A denial-of-service vulnerability due to an out of bounds read condition exists in the OpenSSL library used in the ICONICS Suite. This vulnerability is in the X.509 certificate verification.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4203" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Version 10.97.2 Critical Fixes Rollup 2 and later is not vulnerable to these exploits. ICONICS recommends that users of its products take the following mitigation steps:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Ensure the 10.97.2 Critical Fixes Rollup release is applied to version 10.97.2 systems.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For systems that do not contain the patch/fix:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Do not use the BACnet/SC feature on a production system.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "ICONICS and Mitsubishi Electric recommend updating the ICONICS Suite with the latest security patches as they become available. ICONICS Suite security patches may be found here (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://partners.iconics.com/Home.aspx" }, { "category": "mitigation", "details": "ICONICS and Mitsubishi Electric are releasing security updates as critical fixes/rollups release. For more information, refer to the ICONICS whitepaper on security vulnerabilities, the most recent version of which can be found here.", "product_ids": [ "CSAFPID-0001" ], "url": "https://iconics.com/About/Security/CERT" }, { "category": "mitigation", "details": "Additional information about the security updates may also be found in Mitsubishi Electric\u0027s security advisories:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Advisory 2022-014", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-014_en.pdf" }, { "category": "mitigation", "details": "Advisory 2023-009", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-009_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-4304", "cwe": { "id": "CWE-208", "name": "Observable Timing Discrepancy" }, "notes": [ { "category": "summary", "text": "An information disclosure vulnerability due to an observable timing discrepancy exists in the OpenSSL library used in the ICONICS Suite. This vulnerability is in the RSA decryption implementation.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4304" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Version 10.97.2 Critical Fixes Rollup 2 and later is not vulnerable to these exploits. ICONICS recommends that users of its products take the following mitigation steps:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Ensure the 10.97.2 Critical Fixes Rollup release is applied to version 10.97.2 systems.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For systems that do not contain the patch/fix:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Do not use the BACnet/SC feature on a production system.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "ICONICS and Mitsubishi Electric recommend updating the ICONICS Suite with the latest security patches as they become available. ICONICS Suite security patches may be found here (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://partners.iconics.com/Home.aspx" }, { "category": "mitigation", "details": "ICONICS and Mitsubishi Electric are releasing security updates as critical fixes/rollups release. For more information, refer to the ICONICS whitepaper on security vulnerabilities, the most recent version of which can be found here.", "product_ids": [ "CSAFPID-0001" ], "url": "https://iconics.com/About/Security/CERT" }, { "category": "mitigation", "details": "Additional information about the security updates may also be found in Mitsubishi Electric\u0027s security advisories:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Advisory 2022-014", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-014_en.pdf" }, { "category": "mitigation", "details": "Advisory 2023-009", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-009_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-4450", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "A denial of service and potential crash vulnerability due to a double free condition exists in the OpenSSL library used in the ICONICS Suite. This vulnerability is in the reading of a PEM file.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4450" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Version 10.97.2 Critical Fixes Rollup 2 and later is not vulnerable to these exploits. ICONICS recommends that users of its products take the following mitigation steps:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Ensure the 10.97.2 Critical Fixes Rollup release is applied to version 10.97.2 systems.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For systems that do not contain the patch/fix:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Do not use the BACnet/SC feature on a production system.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "ICONICS and Mitsubishi Electric recommend updating the ICONICS Suite with the latest security patches as they become available. ICONICS Suite security patches may be found here (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://partners.iconics.com/Home.aspx" }, { "category": "mitigation", "details": "ICONICS and Mitsubishi Electric are releasing security updates as critical fixes/rollups release. For more information, refer to the ICONICS whitepaper on security vulnerabilities, the most recent version of which can be found here.", "product_ids": [ "CSAFPID-0001" ], "url": "https://iconics.com/About/Security/CERT" }, { "category": "mitigation", "details": "Additional information about the security updates may also be found in Mitsubishi Electric\u0027s security advisories:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Advisory 2022-014", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-014_en.pdf" }, { "category": "mitigation", "details": "Advisory 2023-009", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-009_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2023-0401", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A denial of service and potential crash vulnerability due to a NULL Pointer dereference exists in the OpenSSL library used in the ICONICS Suite. This vulnerability can occur when signatures are being verified.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0401" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Version 10.97.2 Critical Fixes Rollup 2 and later is not vulnerable to these exploits. ICONICS recommends that users of its products take the following mitigation steps:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Ensure the 10.97.2 Critical Fixes Rollup release is applied to version 10.97.2 systems.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For systems that do not contain the patch/fix:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Do not use the BACnet/SC feature on a production system.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "ICONICS and Mitsubishi Electric recommend updating the ICONICS Suite with the latest security patches as they become available. ICONICS Suite security patches may be found here (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://partners.iconics.com/Home.aspx" }, { "category": "mitigation", "details": "ICONICS and Mitsubishi Electric are releasing security updates as critical fixes/rollups release. For more information, refer to the ICONICS whitepaper on security vulnerabilities, the most recent version of which can be found here.", "product_ids": [ "CSAFPID-0001" ], "url": "https://iconics.com/About/Security/CERT" }, { "category": "mitigation", "details": "Additional information about the security updates may also be found in Mitsubishi Electric\u0027s security advisories:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Advisory 2022-014", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-014_en.pdf" }, { "category": "mitigation", "details": "Advisory 2023-009", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-009_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }
icsa-23-005-03
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Hitachi Energy", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could cause a denial-of-service condition or unauthorized remote arbitrary code execution.", "title": "Risk evaluation" }, { "category": "other", "text": " Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": " Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": " Switzerland", "title": "Company headquarters location" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-23-005-03 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-005-03.json" }, { "category": "self", "summary": "ICS Advisory ICSA-23-005-03 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-005-03" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" } ], "title": "Hitachi Energy Lumada Asset Performance Management", "tracking": { "current_release_date": "2023-01-05T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-23-005-03", "initial_release_date": "2023-01-05T00:00:00.000000Z", "revision_history": [ { "date": "2023-01-05T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Publication Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "6.5.0.0", "product": { "name": "Lumada Asset Performance Management (APM): Lumada APM: Version 6.5.0.0", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Lumada APM" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 6.1.0.0 | \u003c= 6.4.0.0 (CVE-2022-37434 only)", "product": { "name": "Lumada Asset Performance Management (APM): Lumada APM: Versions 6.1.0.0 through 6.4.0.0 (CVE-2022-37434 only)", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Lumada APM" } ], "category": "vendor", "name": "Hitachi Energy" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-3602", "cwe": { "id": "CWE-1357", "name": "Reliance on Insufficiently Trustworthy Component" }, "notes": [ { "category": "summary", "text": "The affected versions of Lumada APM rely on a version of OpenSSL that contains a buffer overflow vulnerability. A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. In Lumada APM, this can be triggered by configuring APM to connect to a malicious server for one of the supported integrations. This may cause a crash of the specific APM service implementing the integration (causing a denial of service).CVE-2022-3602 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3602" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "For all listed vulnerabilities: Lumada APM Version 6.5.0.1 or later.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Users should contact Hitachi Energy for instructions on acquiring and installing the new versions.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Note: Hitachi Energy has already remediated these vulnerabilities for cloud-based deployments (software-as-a-service) of Lumada APM.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Hitachi Energy encourages users to apply recommended security practices and firewall configurations. ", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Protect process control systems from physical access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Do not allow process control systems to have direct connections to the Internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks via a firewall system with a minimal number of exposed ports.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Have security updates applied to installed software components.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Do not use process control systems for personal use such as web browsing or checking emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Carefully scan portable computers and removable storage media for viruses before connection to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy advisory 8DBD000134.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000134" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-3786", "cwe": { "id": "CWE-1357", "name": "Reliance on Insufficiently Trustworthy Component" }, "notes": [ { "category": "summary", "text": "The affected versions of Lumada APM rely on a version of OpenSSL that contains a buffer overflow vulnerability. A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. In Lumada APM, this can be triggered by configuring APM to connect to a malicious server for one of the supported integrations. This may cause a crash of the specific APM service implementing the integration (causing a denial of service).CVE-2022-3786 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).\n", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3786" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "For all listed vulnerabilities: Lumada APM Version 6.5.0.1 or later.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Users should contact Hitachi Energy for instructions on acquiring and installing the new versions.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Note: Hitachi Energy has already remediated these vulnerabilities for cloud-based deployments (software-as-a-service) of Lumada APM.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Hitachi Energy encourages users to apply recommended security practices and firewall configurations. ", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Protect process control systems from physical access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Do not allow process control systems to have direct connections to the Internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks via a firewall system with a minimal number of exposed ports.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Have security updates applied to installed software components.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Do not use process control systems for personal use such as web browsing or checking emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Carefully scan portable computers and removable storage media for viruses before connection to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy advisory 8DBD000134.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000134" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-37434", "cwe": { "id": "CWE-1357", "name": "Reliance on Insufficiently Trustworthy Component" }, "notes": [ { "category": "summary", "text": "The affected versions of Lumada APM rely on a version of zlib that contains an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in denial of service or potentially the execution of arbitrary code.CVE-2022-37434 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3786" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "For all listed vulnerabilities: Lumada APM Version 6.5.0.1 or later.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "For CVE-2022-37434 only: Lumada APM Version 6.4.0.1 or later.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Users should contact Hitachi Energy for instructions on acquiring and installing the new versions.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Note: Hitachi Energy has already remediated these vulnerabilities for cloud-based deployments (software-as-a-service) of Lumada APM.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Hitachi Energy encourages users to apply recommended security practices and firewall configurations. ", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Protect process control systems from physical access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Do not allow process control systems to have direct connections to the Internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks via a firewall system with a minimal number of exposed ports.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Have security updates applied to installed software components.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Do not use process control systems for personal use such as web browsing or checking emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Carefully scan portable computers and removable storage media for viruses before connection to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy advisory 8DBD000134.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000134" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] } ] }
icsa-22-349-09
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of this vulnerability could allow for a denial of service or remote code execution.", "title": "Risk evaluation" }, { "category": "other", "text": " Critical Manufacturing ", "title": "Critical infrastructure sectors" }, { "category": "other", "text": " Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": " Germany", "title": "Company headquarters location" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens operational guidelines for industrial security and to follow the recommendations in the product manuals.\nFor more information, see the associated Siemens security advisory SSA-408105 in HTML and CSAF.\nCISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "Recommended Practices", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-408105.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-349-09 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-349-09.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-349-09 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-09" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-408105.html" }, { "category": "external", "summary": "SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-408105.json" }, { "category": "external", "summary": "SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-408105.pdf" }, { "category": "external", "summary": "SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-408105.txt" } ], "title": "Siemens Products affected by OpenSSL 3.0", "tracking": { "current_release_date": "2022-12-15T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-349-09", "initial_release_date": "2022-12-15T00:00:00.000000Z", "revision_history": [ { "date": "2022-12-15T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Publication Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V2022.4\u003cV2023.1", "product": { "name": "Calibre ICE", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Calibre ICE" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V5.2.1.0", "product": { "name": "Mcenter", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Mcenter" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V3.2.7", "product": { "name": "SCALANCE X-200RNA switch family", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "SCALANCE X-200RNA switch family" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V1.80\u003cV2.20", "product": { "name": "SICAM GridPass (6MD7711-2AA00-1EA0)", "product_id": "CSAFPID-0004", "product_identification_helper": { "model_numbers": [ "6MD7711-2AA00-1EA0" ] } } } ], "category": "product_name", "name": "SICAM GridPass (6MD7711-2AA00-1EA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V2.13", "product": { "name": "SIMATIC RTLS Locating Manager (6GT2780-0DA00)", "product_id": "CSAFPID-0005", "product_identification_helper": { "model_numbers": [ "6GT2780-0DA00" ] } } } ], "category": "product_name", "name": "SIMATIC RTLS Locating Manager (6GT2780-0DA00)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-3602", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3602" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens products that contain a vulnerable TLS server and have certificate-based client authentication enabled: do not configure trust for CA certificates, that contain a nameConstraint-extension (https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Siemens products that contain a vulnerable TLS client: in cases where this option is configurable: ensure that TLS server certificate verification is turned on and do not configure trust for CA certificates, that contain a nameConstraint-extension (https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "As a mitigation for vulnerable versions: In the truststore, do not add CA certificates that contain a nameConstraint-extension (\nhttps://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0004" ] }, { "category": "mitigation", "details": "Ensure that only trusted (CA) certificates are contained in the Machine Agent\u0027s truststore", "product_ids": [ "CSAFPID-0002" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V2.20 or later version", "product_ids": [ "CSAFPID-0004" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109763384/" }, { "category": "vendor_fix", "details": "Update to V2023.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.sw.siemens.com/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-3602" }, { "cve": "CVE-2022-3786", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.\u0027 character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3786" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens products that contain a vulnerable TLS server and have certificate-based client authentication enabled: do not configure trust for CA certificates, that contain a nameConstraint-extension (https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Siemens products that contain a vulnerable TLS client: in cases where this option is configurable: ensure that TLS server certificate verification is turned on and do not configure trust for CA certificates, that contain a nameConstraint-extension (https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "As a mitigation for vulnerable versions: In the truststore, do not add CA certificates that contain a nameConstraint-extension (\nhttps://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names", "product_ids": [ "CSAFPID-0004" ] }, { "category": "mitigation", "details": "Ensure that only trusted (CA) certificates are contained in the Machine Agent\u0027s truststore", "product_ids": [ "CSAFPID-0002" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V2.20 or later version", "product_ids": [ "CSAFPID-0004" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109763384/" }, { "category": "vendor_fix", "details": "Update to V2023.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.sw.siemens.com/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-3786" } ] }
wid-sec-w-2023-1969
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Fabric OS (FOS) ist ein Betriebssystem f\u00fcr FibreChannel Switches.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches ausnutzen, um seine Privilegien zu erh\u00f6hen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware\n- Hardware Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1969 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1969.json" }, { "category": "self", "summary": "WID-SEC-2023-1969 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1969" }, { "category": "external", "summary": "HPE Security Bulletin HPESBST04494 vom 2023-08-04", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04494en_us" } ], "source_lang": "en-US", "title": "HPE Fabric OS: Mehrere Schwachstellen erm\u00f6glichen Privilegieneskalation", "tracking": { "current_release_date": "2023-08-06T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:39:20.279+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1969", "initial_release_date": "2023-08-06T22:00:00.000+00:00", "revision_history": [ { "date": "2023-08-06T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "HPE Fabric OS \u003c 9.1.1", "product": { "name": "HPE Fabric OS \u003c 9.1.1", "product_id": "T024587", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:9.1.1" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c v8.2.3c", "product": { "name": "HPE Fabric OS \u003c v8.2.3c", "product_id": "T024589", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:v8.2.3c" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c 7.4.2j", "product": { "name": "HPE Fabric OS \u003c 7.4.2j", "product_id": "T029096", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:7.4.2j" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c v8.2.3d", "product": { "name": "HPE Fabric OS \u003c v8.2.3d", "product_id": "T029097", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:v8.2.3d" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c 9.0.1e", "product": { "name": "HPE Fabric OS \u003c 9.0.1e", "product_id": "T029098", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:9.0.1e" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c 9.1.1c", "product": { "name": "HPE Fabric OS \u003c 9.1.1c", "product_id": "T029101", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:9.1.1c" } } } ], "category": "product_name", "name": "Fabric OS" }, { "branches": [ { "category": "product_name", "name": "HPE Switch SAN", "product": { "name": "HPE Switch SAN", "product_id": "T029100", "product_identification_helper": { "cpe": "cpe:/h:hp:switch:san_switch" } } }, { "category": "product_name", "name": "HPE Switch Fibre Channel", "product": { "name": "HPE Switch Fibre Channel", "product_id": "T029104", "product_identification_helper": { "cpe": "cpe:/h:hp:switch:fibre_channel" } } } ], "category": "product_name", "name": "Switch" } ], "category": "vendor", "name": "HPE" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-31928", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31928" }, { "cve": "CVE-2023-31927", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31927" }, { "cve": "CVE-2023-31926", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31926" }, { "cve": "CVE-2023-31432", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31432" }, { "cve": "CVE-2023-31431", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31431" }, { "cve": "CVE-2023-31430", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31430" }, { "cve": "CVE-2023-31429", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31429" }, { "cve": "CVE-2023-31428", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31428" }, { "cve": "CVE-2023-31427", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31427" }, { "cve": "CVE-2023-31426", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31426" }, { "cve": "CVE-2023-31425", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31425" }, { "cve": "CVE-2022-44792", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-44792" }, { "cve": "CVE-2022-3786", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-3786" }, { "cve": "CVE-2022-3602", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-3602" }, { "cve": "CVE-2022-29154", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-29154" }, { "cve": "CVE-2022-28615", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-28615" }, { "cve": "CVE-2022-28614", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-28614" }, { "cve": "CVE-2022-25313", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-24448", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-24448" }, { "cve": "CVE-2022-23219", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-23219" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-0322", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-0322" }, { "cve": "CVE-2022-0155", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-0155" }, { "cve": "CVE-2021-45486", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-45486" }, { "cve": "CVE-2021-45485", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-45485" }, { "cve": "CVE-2021-41617", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-41617" }, { "cve": "CVE-2021-4145", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-4145" }, { "cve": "CVE-2021-39275", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-39275" }, { "cve": "CVE-2021-3800", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-3800" }, { "cve": "CVE-2021-20193", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-20193" }, { "cve": "CVE-2021-0146", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-0146" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-15861", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2020-15861" }, { "cve": "CVE-2020-14145", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2020-14145" }, { "cve": "CVE-2019-0220", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2019-0220" }, { "cve": "CVE-2018-7738", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-7738" }, { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-25032" }, { "cve": "CVE-2018-14404", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-14404" }, { "cve": "CVE-2018-14348", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-14348" }, { "cve": "CVE-2018-0739", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-0739" }, { "cve": "CVE-2014-2524", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2014-2524" }, { "cve": "CVE-2012-0060", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2012-0060" }, { "cve": "CVE-2011-4917", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2011-4917" } ] }
wid-sec-w-2022-1922
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "OpenSSL ist eine im Quelltext frei verf\u00fcgbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in OpenSSL ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren und potenziell um beliebigen Programmcode auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Appliance\n- CISCO Appliance\n- F5 Networks\n- Hardware Appliance\n- Juniper Appliance\n- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1922 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1922.json" }, { "category": "self", "summary": "WID-SEC-2022-1922 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1922" }, { "category": "external", "summary": "OpenSSL Security Advisory vom 2022-11-01", "url": "https://www.openssl.org/news/secadv/20221101.txt" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7288 vom 2022-11-01", "url": "https://access.redhat.com/errata/RHSA-2022:7288" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-157 vom 2022-11-01", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-157.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-7288 vom 2022-11-01", "url": "https://linux.oracle.com/errata/ELSA-2022-7288.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3843-1 vom 2022-11-01", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012796.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202211-01 vom 2022-11-01", "url": "https://security.gentoo.org/glsa/202211-01" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5710-1 vom 2022-11-01", "url": "https://ubuntu.com/security/notices/USN-5710-1" }, { "category": "external", "summary": "Juniper Security Bulletin vom 2022-11-01", "url": "https://supportportal.juniper.net/s/article/2022-11-Out-of-Cycle-Security-Bulletin-High-severity-security-issues-resolved-in-OpenSSL-3-0-7-CVE-2022-3602-CVE-2022-3786" }, { "category": "external", "summary": "Cisco Security Advisory cisco-sa-openssl-W9sdCc2a vom 2022-11-01", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-W9sdCc2a" }, { "category": "external", "summary": "PoC", "url": "https://github.com/micr0sh0ft/certscare-openssl3-exploit" }, { "category": "external", "summary": "Tenable Security Advisory TNS-2022-22 vom 2022-11-02", "url": "https://www.cybersecurity-help.cz/vdb/SB2022110251" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7384 vom 2022-11-03", "url": "https://access.redhat.com/errata/RHSA-2022:7384" }, { "category": "external", "summary": "Tenable Security Advisory TNS-2022-24 vom 2022-11-03", "url": "https://www.tenable.com/security/tns-2022-24" }, { "category": "external", "summary": "Tenable Security Advisory TNS-2022-22 vom 2022-11-02", "url": "https://www.tenable.com/security/tns-2022-22" }, { "category": "external", "summary": "Tenable Security Advisory TNS-2022-23 vom 2022-11-03", "url": "https://www.tenable.com/security/tns-2022-23" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20221102-0001 vom 2022-11-02", "url": "https://security.netapp.com/advisory/ntap-20221102-0001/" }, { "category": "external", "summary": "IBM Security Bulletin 6837195 vom 2022-11-05", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-advanced-message-security-on-ibm-i-platforms-is-affected-by-a-buffer-overflow-issue-in-openssl-cve-2022-3602-cve-2022-3786/" }, { "category": "external", "summary": "node.js Security Release", "url": "https://nodejs.org/en/blog/vulnerability/november-2022-security-releases/" }, { "category": "external", "summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2022-11-02", "url": "https://msrc.microsoft.com/update-guide" }, { "category": "external", "summary": "Unify Security Advisory Report OBSO-2211-01 vom 2022-11-08", "url": "https://networks.unify.com/security/advisories/OBSO-2211-01.pdf" }, { "category": "external", "summary": "Tenable Security Advisory TNS-2022-25 vom 2022-11-08", "url": "https://www.tenable.com/security/tns-2022-25" }, { "category": "external", "summary": "Alcatel-Lucent Security Advisory", "url": "https://app.conversation.al-enterprise.com/e/er?s=138097979\u0026lid=16028" }, { "category": "external", "summary": "SolarWinds Trust Center Security Advisories", "url": "https://www.solarwinds.com/de/trust-center/security-advisories/cve-2022-3602-and-cve-2022-3786" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-10004 vom 2022-11-17", "url": "https://linux.oracle.com/errata/ELSA-2022-10004.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:4586-1 vom 2022-12-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013293.html" }, { "category": "external", "summary": "IBM Security Bulletin 6857295 vom 2023-01-24", "url": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory37.asc" }, { "category": "external", "summary": "IBM Security Bulletin 6999285 vom 2023-05-30", "url": "https://www.ibm.com/support/pages/node/6999285" }, { "category": "external", "summary": "Lenovo Security Advisory LEN-106015 vom 2023-08-09", "url": "https://support.lenovo.com/us/en/product_security/LEN-106015" }, { "category": "external", "summary": "AMD Security Bulletin AMD-SB-7001 vom 2023-08-09", "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7001.html" }, { "category": "external", "summary": "HPE Securi+y Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04494en_us" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-286 vom 2024-01-23", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2023-286.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12343 vom 2024-04-25", "url": "https://linux.oracle.com/errata/ELSA-2024-12343.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-20865 vom 2024-04-25", "url": "https://linux.oracle.com/errata/ELSA-2024-20865.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-23120 vom 2024-06-04", "url": "https://linux.oracle.com/errata/ELSA-2024-23120.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12409 vom 2024-06-04", "url": "https://linux.oracle.com/errata/ELSA-2024-12409.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12408 vom 2024-06-05", "url": "https://linux.oracle.com/errata/ELSA-2024-12408.html" } ], "source_lang": "en-US", "title": "OpenSSL: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-06-04T22:00:00.000+00:00", "generator": { "date": "2024-06-05T08:08:36.961+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1922", "initial_release_date": "2022-11-01T23:00:00.000+00:00", "revision_history": [ { "date": "2022-11-01T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-11-02T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Tenable, Red Hat und NetApp aufgenommen" }, { "date": "2022-11-06T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-11-08T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Unify und Tenable aufgenommen" }, { "date": "2022-11-10T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates aufgenommen" }, { "date": "2022-11-17T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-12-20T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-01-24T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-05-30T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-08-08T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von LENOVO und AMD aufgenommen" }, { "date": "2023-08-13T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2024-01-22T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-04-24T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-06-04T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "14" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "AMD Radeon", "product": { "name": "AMD Radeon", "product_id": "T029174", "product_identification_helper": { "cpe": "cpe:/h:amd:radeon:-" } } } ], "category": "vendor", "name": "AMD" }, { "branches": [ { "category": "product_name", "name": "Alcatel Lucent Enterprise OmniSwitch", "product": { "name": "Alcatel Lucent Enterprise OmniSwitch", "product_id": "T017286", "product_identification_helper": { "cpe": "cpe:/h:alcatel-lucent:omniswitch:-" } } } ], "category": "vendor", "name": "Alcatel Lucent Enterprise" }, { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Broadcom Brocade Switch", "product": { "name": "Broadcom Brocade Switch", "product_id": "T015844", "product_identification_helper": { "cpe": "cpe:/h:brocade:switch:-" } } } ], "category": "vendor", "name": "Broadcom" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "HPE Switch", "product": { "name": "HPE Switch", "product_id": "T005119", "product_identification_helper": { "cpe": "cpe:/h:hp:switch:-" } } } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "category": "product_name", "name": "IBM AIX", "product": { "name": "IBM AIX", "product_id": "5094", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:-" } } }, { "branches": [ { "category": "product_version", "name": "9.3 LTS", "product": { "name": "IBM MQ 9.3 LTS", "product_id": "T024689", "product_identification_helper": { "cpe": "cpe:/a:ibm:mq:9.3_lts" } } } ], "category": "product_name", "name": "MQ" }, { "branches": [ { "category": "product_version_range", "name": "plus \u003c10.1.14", "product": { "name": "IBM Spectrum Protect plus \u003c10.1.14", "product_id": "T027906", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:plus__10.1.14" } } } ], "category": "product_name", "name": "Spectrum Protect" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "Evolved", "product": { "name": "Juniper JUNOS Evolved", "product_id": "T018886", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:evolved" } } } ], "category": "product_name", "name": "JUNOS" } ], "category": "vendor", "name": "Juniper" }, { "branches": [ { "category": "product_name", "name": "Lenovo Computer", "product": { "name": "Lenovo Computer", "product_id": "T026557", "product_identification_helper": { "cpe": "cpe:/h:lenovo:computer:-" } } } ], "category": "vendor", "name": "Lenovo" }, { "branches": [ { "category": "product_name", "name": "Microsoft Windows Azure", "product": { "name": "Microsoft Windows Azure", "product_id": "T010156", "product_identification_helper": { "cpe": "cpe:/a:microsoft:windows_azure:-" } } } ], "category": "vendor", "name": "Microsoft" }, { "branches": [ { "category": "product_name", "name": "NetApp Data ONTAP", "product": { "name": "NetApp Data ONTAP", "product_id": "7654", "product_identification_helper": { "cpe": "cpe:/a:netapp:data_ontap:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c14.21.1", "product": { "name": "Open Source Node.js \u003c14.21.1", "product_id": "T025226", "product_identification_helper": { "cpe": "cpe:/a:nodejs:nodejs:14.21.1" } } }, { "category": "product_version_range", "name": "\u003c16.18.1", "product": { "name": "Open Source Node.js \u003c16.18.1", "product_id": "T025228", "product_identification_helper": { "cpe": "cpe:/a:nodejs:nodejs:16.18.1" } } }, { "category": "product_version_range", "name": "\u003c18.12.1", "product": { "name": "Open Source Node.js \u003c18.12.1", "product_id": "T025229", "product_identification_helper": { "cpe": "cpe:/a:nodejs:nodejs:18.12.1" } } }, { "category": "product_version_range", "name": "\u003c19.0.1", "product": { "name": "Open Source Node.js \u003c19.0.1", "product_id": "T025230", "product_identification_helper": { "cpe": "cpe:/a:nodejs:nodejs:19.0.1" } } } ], "category": "product_name", "name": "Node.js" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=3.0.0", "product": { "name": "Open Source OpenSSL \u003e=3.0.0", "product_id": "T021310", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:3.0.0" } } }, { "category": "product_version_range", "name": "\u003c3.0.7", "product": { "name": "Open Source OpenSSL \u003c3.0.7", "product_id": "T025170", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:3.0.7" } } } ], "category": "product_name", "name": "OpenSSL" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "T015361", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "product_name", "name": "Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "15.3.1", "product": { "name": "SolarWinds Serv-U Managed File Transfer Server 15.3.1", "product_id": "1174338", "product_identification_helper": { "cpe": "cpe:/a:solarwinds:serv-u:15.3.1" } } } ], "category": "product_name", "name": "Serv-U Managed File Transfer Server" } ], "category": "vendor", "name": "SolarWinds" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "Agent 10.0.0-10.2.0", "product": { "name": "Tenable Security Nessus Agent 10.0.0-10.2.0", "product_id": "T025191", "product_identification_helper": { "cpe": "cpe:/a:tenable:nessus:agent_10.0.0_-_10.2.0" } } }, { "category": "product_version", "name": "10.3.2", "product": { "name": "Tenable Security Nessus 10.3.2", "product_id": "T025192", "product_identification_helper": { "cpe": "cpe:/a:tenable:nessus:10.3.2" } } }, { "category": "product_version_range", "name": "\u003c10.4.1", "product": { "name": "Tenable Security Nessus \u003c10.4.1", "product_id": "T025193", "product_identification_helper": { "cpe": "cpe:/a:tenable:nessus:10.4.1" } } }, { "category": "product_version_range", "name": "\u003cnetwork monitor 6.1.1", "product": { "name": "Tenable Security Nessus \u003cnetwork monitor 6.1.1", "product_id": "T025264", "product_identification_helper": { "cpe": "cpe:/a:tenable:nessus:network_monitor_6.1.1" } } } ], "category": "product_name", "name": "Nessus" } ], "category": "vendor", "name": "Tenable Security" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e10.4.8.2", "product": { "name": "Unify OpenScape UC Application \u003e10.4.8.2", "product_id": "T025257", "product_identification_helper": { "cpe": "cpe:/a:unify:openscape_uc_application:10.4.8.2" } } } ], "category": "product_name", "name": "OpenScape UC Application" } ], "category": "vendor", "name": "Unify" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-3602", "notes": [ { "category": "description", "text": "In OpenSSL existieren mehrere Schwachstellen aufgrund von zwei Puffer\u00fcberlauffehlern bei der Verarbeitung von E-Mailadressen. Diese k\u00f6nnen ausgel\u00f6st werden, wenn Name Constraints gepr\u00fcft werden. Die Pr\u00fcfung erfolgt jedoch erst, nachdem die Zertifikatskette grundlegend validiert wurde. F\u00fcr einen erfolgreichen Angriff muss eine beim Opfer als vertrauensw\u00fcrdig eingestufte CA ein b\u00f6sartig gestaltetes Zertifikat ausstellen, welches beim Angriff durch das Opfersystem validiert werden muss. Dadurch kann ein Angreifer einen Denial of Service Zustand herbeif\u00fchren oder potenziell Code ausf\u00fchren." } ], "product_status": { "known_affected": [ "T025193", "T029174", "67646", "T025192", "T015844", "T025191", "T010156", "T004914", "T015361", "T018886", "T024689", "T025257", "398363", "T025230", "7654", "T005119", "T012167", "5094", "T017286", "T027906", "T002207", "T025228", "1174338", "T000126", "T025229", "T025226", "T026557", "T025264" ] }, "release_date": "2022-11-01T23:00:00Z", "title": "CVE-2022-3602" }, { "cve": "CVE-2022-3786", "notes": [ { "category": "description", "text": "In OpenSSL existieren mehrere Schwachstellen aufgrund von zwei Puffer\u00fcberlauffehlern bei der Verarbeitung von E-Mailadressen. Diese k\u00f6nnen ausgel\u00f6st werden, wenn Name Constraints gepr\u00fcft werden. Die Pr\u00fcfung erfolgt jedoch erst, nachdem die Zertifikatskette grundlegend validiert wurde. F\u00fcr einen erfolgreichen Angriff muss eine beim Opfer als vertrauensw\u00fcrdig eingestufte CA ein b\u00f6sartig gestaltetes Zertifikat ausstellen, welches beim Angriff durch das Opfersystem validiert werden muss. Dadurch kann ein Angreifer einen Denial of Service Zustand herbeif\u00fchren oder potenziell Code ausf\u00fchren." } ], "product_status": { "known_affected": [ "T025193", "T029174", "67646", "T025192", "T015844", "T025191", "T010156", "T004914", "T015361", "T018886", "T024689", "T025257", "398363", "T025230", "7654", "T005119", "T012167", "5094", "T017286", "T027906", "T002207", "T025228", "1174338", "T000126", "T025229", "T025226", "T026557", "T025264" ] }, "release_date": "2022-11-01T23:00:00Z", "title": "CVE-2022-3786" } ] }
wid-sec-w-2023-0561
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0561 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0561.json" }, { "category": "self", "summary": "WID-SEC-2023-0561 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0561" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-007 vom 2023-05-18", "url": "https://security.business.xerox.com/wp-content/uploads/2023/05/Xerox-Security-Bulletin-XRX23-007-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v7.pdf" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-005 vom 2023-04-04", "url": "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-002 vom 2023-03-23", "url": "https://security.business.xerox.com/wp-content/uploads/2023/03/Xerox-Security-Bulletin-XRX23-002-FreeFlow-Print-Server-v2_Windows10.pdf" }, { "category": "external", "summary": "Xerox Mini Bulletin XRX21A vom 2023-03-02", "url": "https://security.business.xerox.com/wp-content/uploads/2023/03/Xerox-Security-Bulletin-XRX23-001-FreeFlow%C2%AE-Print-Server-v7.pdf" } ], "source_lang": "en-US", "title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-05-18T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:17:56.928+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-0561", "initial_release_date": "2023-03-02T23:00:00.000+00:00", "revision_history": [ { "date": "2023-03-02T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-03-22T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2023-04-03T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2023-05-18T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von XEROX aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server 7", "product": { "name": "Xerox FreeFlow Print Server 7", "product_id": "T000872", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:7" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server 9", "product": { "name": "Xerox FreeFlow Print Server 9", "product_id": "T002977", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server v2", "product": { "name": "Xerox FreeFlow Print Server v2", "product_id": "T014888", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v2" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-21900", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2023-21900" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2022-46882", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-46882" }, { "cve": "CVE-2022-46881", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-46881" }, { "cve": "CVE-2022-46880", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-46880" }, { "cve": "CVE-2022-46878", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-46878" }, { "cve": "CVE-2022-46875", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-46875" }, { "cve": "CVE-2022-46874", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-46874" }, { "cve": "CVE-2022-46872", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-46872" }, { "cve": "CVE-2022-45421", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-45421" }, { "cve": "CVE-2022-45420", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-45420" }, { "cve": "CVE-2022-45419", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-45419" }, { "cve": "CVE-2022-45418", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-45418" }, { "cve": "CVE-2022-45417", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-45417" }, { "cve": "CVE-2022-45416", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-45416" }, { "cve": "CVE-2022-45415", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-45415" }, { "cve": "CVE-2022-45414", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-45414" }, { "cve": "CVE-2022-45413", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-45413" }, { "cve": "CVE-2022-45412", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-45412" }, { "cve": "CVE-2022-45411", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-45411" }, { "cve": "CVE-2022-45410", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-45410" }, { "cve": "CVE-2022-45409", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-45409" }, { "cve": "CVE-2022-45408", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-45408" }, { "cve": "CVE-2022-45407", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-45407" }, { "cve": "CVE-2022-45406", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-45406" }, { "cve": "CVE-2022-45405", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-45405" }, { "cve": "CVE-2022-45404", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-45404" }, { "cve": "CVE-2022-45403", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-45403" }, { "cve": "CVE-2022-45063", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-45063" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43548", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-43548" }, { "cve": "CVE-2022-42932", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-42932" }, { "cve": "CVE-2022-42929", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-42929" }, { "cve": "CVE-2022-42928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-42928" }, { "cve": "CVE-2022-42927", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-42927" }, { "cve": "CVE-2022-42252", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-42252" }, { "cve": "CVE-2022-41556", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-41556" }, { "cve": "CVE-2022-41323", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-41323" }, { "cve": "CVE-2022-40962", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-40962" }, { "cve": "CVE-2022-40960", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-40960" }, { "cve": "CVE-2022-40959", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-40959" }, { "cve": "CVE-2022-40958", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-40958" }, { "cve": "CVE-2022-40957", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-40957" }, { "cve": "CVE-2022-40956", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-40956" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-39260", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-39260" }, { "cve": "CVE-2022-39253", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-39253" }, { "cve": "CVE-2022-3786", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-3786" }, { "cve": "CVE-2022-37797", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-37797" }, { "cve": "CVE-2022-37454", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-37454" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-36087", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-36087" }, { "cve": "CVE-2022-36059", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-36059" }, { "cve": "CVE-2022-3602", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-3602" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-3598", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-3598" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3570", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-3570" }, { "cve": "CVE-2022-35256", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-35256" }, { "cve": "CVE-2022-35255", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-35255" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-3276", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-3276" }, { "cve": "CVE-2022-32222", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-32222" }, { "cve": "CVE-2022-32215", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-32215" }, { "cve": "CVE-2022-32213", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-32213" }, { "cve": "CVE-2022-32212", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-32212" }, { "cve": "CVE-2022-3204", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-3204" }, { "cve": "CVE-2022-3190", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-3190" }, { "cve": "CVE-2022-31630", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-31630" }, { "cve": "CVE-2022-31629", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-31629" }, { "cve": "CVE-2022-31628", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-31628" }, { "cve": "CVE-2022-3155", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-3155" }, { "cve": "CVE-2022-3034", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-3034" }, { "cve": "CVE-2022-3033", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-3033" }, { "cve": "CVE-2022-3032", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-3032" }, { "cve": "CVE-2022-29458", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-29458" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-29154", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-29154" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-27406", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-27406" }, { "cve": "CVE-2022-27405", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-27405" }, { "cve": "CVE-2022-27404", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-27404" }, { "cve": "CVE-2022-26981", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-26981" }, { "cve": "CVE-2022-24765", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-24765" }, { "cve": "CVE-2022-24070", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-24070" }, { "cve": "CVE-2022-23901", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-23901" }, { "cve": "CVE-2022-22844", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-22844" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-21658", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-21658" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2122", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-2122" }, { "cve": "CVE-2022-2058", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-2058" }, { "cve": "CVE-2022-2057", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-2057" }, { "cve": "CVE-2022-2056", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-2056" }, { "cve": "CVE-2022-1925", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-1925" }, { "cve": "CVE-2022-1924", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-1924" }, { "cve": "CVE-2022-1923", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-1923" }, { "cve": "CVE-2022-1922", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-1922" }, { "cve": "CVE-2022-1921", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-1921" }, { "cve": "CVE-2022-1920", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-1920" }, { "cve": "CVE-2022-1348", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-1348" }, { "cve": "CVE-2022-1056", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-1056" }, { "cve": "CVE-2022-0924", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-0924" }, { "cve": "CVE-2022-0909", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-0909" }, { "cve": "CVE-2022-0908", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-0908" }, { "cve": "CVE-2022-0907", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-0907" }, { "cve": "CVE-2022-0891", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-0891" }, { "cve": "CVE-2022-0865", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-0865" }, { "cve": "CVE-2022-0562", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-0562" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-0561" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2021-46823", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2021-46823" }, { "cve": "CVE-2021-42694", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2021-42694" }, { "cve": "CVE-2021-42574", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2021-42574" }, { "cve": "CVE-2021-37750", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2021-37750" }, { "cve": "CVE-2021-28544", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2021-28544" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2019-6111", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2019-6111" }, { "cve": "CVE-2018-7160", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2018-7160" }, { "cve": "CVE-2015-20107", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2015-20107" }, { "cve": "CVE-2006-20001", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2006-20001" } ] }
cisco-sa-openssl-w9sdcc2a
Vulnerability from csaf_cisco
Notes
{ "document": { "acknowledgments": [ { "summary": "These vulnerabilities were publicly disclosed by the OpenSSL Software Foundation on November 1, 2022." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "On November 1, 2022, the OpenSSL Project announced the following vulnerabilities:\r\n\r\nCVE-2022-3602 - X.509 Email Address 4-byte Buffer Overflow\r\nCVE-2022-3786 - X.509 Email Address Variable Length Buffer Overflow\r\n\r\nFor a description of these vulnerabilities, see OpenSSL Security Advisory [Nov 1 2022] [\"https://www.openssl.org/news/secadv/20221101.txt\"].\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-W9sdCc2a [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-W9sdCc2a\"]", "title": "Summary" }, { "category": "general", "text": "Cisco investigated its product line to determine which products and cloud services may be affected by these vulnerabilities. OpenSSL 3.x is not widely used in Cisco products and cloud offers, and only products that may contain the affected software are listed in this advisory. If a product or cloud offer is not explicitly listed in this advisory, it is not vulnerable.", "title": "Affected Products" }, { "category": "general", "text": "The following table lists Cisco products that are affected by one or more of the vulnerabilities that are described in this advisory. If a future release date is indicated for software, the date provided represents an estimate based on all information known to Cisco as of the Last Updated date at the top of the advisory. Availability dates are subject to change based on a number of factors, including satisfactory testing results and delivery of other priority features and fixes. If no version or date is listed for an affected component (indicated by a blank field and/or an advisory designation of Interim), Cisco is continuing to evaluate the fix and will update the advisory as additional information becomes available. After the advisory is marked Final, customers should refer to the associated Cisco bug(s) for further details.\r\n Product Cisco Bug ID Fixed Release Availability [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"] Endpoint Clients and Client Software Operational Insights Collector CSCwd44110 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd44110\"] ScienceLogic Application Software 3.0.1 (Nov 2022)\r\nHPNA Application Software 2.0.1 (Nov 2022)\r\nAPIC Application Software 3.0.1 (Nov 2022)\r\nSolarWinds Application Software 3.0.1 (Nov 2022)\r\nSyslog Collector 2.0.1 (Nov 2022) Network Management and Provisioning IoT Field Network Director, formerly Connected Grid Network Management System CSCwd44112 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd44112\"] 4.8.1 (Available)\r\n4.9.0 (Available)\r\n5.0.0 (May 2023)", "title": "Vulnerable Products" }, { "category": "general", "text": "Only products that may contain the affected software are listed in this advisory. If a product or cloud offer is not explicitly listed in this advisory, it is not vulnerable.\r\n\r\nCisco has confirmed that this vulnerability does not affect the following Cisco products:\r\n\r\nNetwork and Content Security Devices\r\n\r\nIdentity Services Engine (ISE)\r\nSecure Network Analytics, formerly Stealthwatch\r\n\r\nNetwork Management and Provisioning\r\n\r\nApplication Policy Infrastructure Controller (APIC)\r\nCisco Container Platform\r\nData Center Network Manager (DCNM)\r\nElastic Services Controller (ESC)\r\nEvolved Programmable Network Manager\r\nNexus Dashboard, formerly Application Services Engine\r\nPrime Infrastructure\r\n\r\nRouting and Switching - Enterprise and Service Provider\r\n\r\nSD-WAN vAnalytics\r\nSD-WAN vManage\r\nUltra Cloud Core - Network Respository Function\r\nUltra Cloud Core - Policy Control Function\r\nUltra Cloud Core - Redundancy Configuration Manager\r\nUltra Cloud Core - Subscriber Microservices Infrastructure\r\nUltra Cloud Core - User Plane Function\r\n\r\nUnified Computing\r\n\r\nHyperFlex System\r\nUCS Blade Server - Integrated Management Controller\r\nUCS Manager\r\n Cisco Cloud Offerings\r\n\r\nCisco investigated its cloud offers to determine which products may be affected by these vulnerabilities. The following table lists Cisco cloud offers that are under investigation. Only cloud offers known to possibly be affected are listed. If a cloud offer is not explicitly listed in this advisory, it is not vulnerable.\r\n\r\n Product Disposition AppDynamics Not affected CX Cloud Not affected Duo Not affected Intersight Not affected Meraki Not affected SD-WAN Not affected SecureX Not affected ThousandEyes Not affected Umbrella Not affected Unified Communications Manager Cloud Not affected Webex Calling Not affected Webex Cloud-Connected UC Not affected Webex Contact Center Not affected Webex Teams Not affected", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "Any workarounds for a specific Cisco product or service will be documented in the relevant Cisco bugs, which are identified in the Vulnerable Products [\"#vp\"] section of this advisory.", "title": "Workarounds" }, { "category": "general", "text": "For information about fixed software releases [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], consult the Cisco bugs identified in the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories [\"https://www.cisco.com/go/psirt\"] page, to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any malicious use of the vulnerabilities that are described in this advisory.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "These vulnerabilities were publicly disclosed by the OpenSSL Software Foundation on November 1, 2022.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.", "issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "Vulnerabilities in OpenSSL Affecting Cisco Products: November 2022", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-W9sdCc2a" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "OpenSSL Security Advisory [Nov 1 2022]", "url": "https://www.openssl.org/news/secadv/20221101.txt" }, { "category": "external", "summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-W9sdCc2a", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-W9sdCc2a" }, { "category": "external", "summary": "Fixed Release Availability", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "CSCwd44110", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd44110" }, { "category": "external", "summary": "CSCwd44112", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd44112" }, { "category": "external", "summary": "fixed software releases", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "considering software upgrades", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "Cisco\u0026nbsp;Security Advisories", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" } ], "title": "Vulnerabilities in OpenSSL Affecting Cisco Products: November 2022", "tracking": { "current_release_date": "2022-11-23T20:23:17+00:00", "generator": { "date": "2022-11-23T20:23:22+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-openssl-W9sdCc2a", "initial_release_date": "2022-10-28T16:00:00+00:00", "revision_history": [ { "date": "2022-10-28T21:40:41+00:00", "number": "1.0.0", "summary": "Initial public release." }, { "date": "2022-11-01T20:23:02+00:00", "number": "1.1.0", "summary": "Update with OpenSSL public announcement." }, { "date": "2022-11-02T19:26:36+00:00", "number": "1.2.0", "summary": "Update products under investigation and products confirmed not vulnerable." }, { "date": "2022-11-03T20:12:42+00:00", "number": "1.3.0", "summary": "Update products under investigation, vulnerable products, and products confirmed not vulnerable." }, { "date": "2022-11-04T18:40:16+00:00", "number": "1.4.0", "summary": "Update affected products and disposition of cloud offers." }, { "date": "2022-11-08T20:57:38+00:00", "number": "1.5.0", "summary": "Update summary, affected products, and disposition of cloud offers." }, { "date": "2022-11-23T20:23:17+00:00", "number": "1.6.0", "summary": "Updated vulnerable products and products confirmed not vulnerable." } ], "status": "final", "version": "1.6.0" } }, "vulnerabilities": [ { "cve": "CVE-2022-3602", "notes": [ { "category": "general", "text": "No additional information for this vulneraiblity is currently avaialbe.", "title": "No Notes" } ], "remediations": [ { "category": "none_available", "details": "No remediation is available at this time." } ], "title": "X.509 Email Address 4-byte Buffer Overflow, Other Vulnerability" }, { "cve": "CVE-2022-3786", "notes": [ { "category": "general", "text": "No additional information for this vulneraiblity is currently avaialbe.", "title": "No Notes" } ], "remediations": [ { "category": "none_available", "details": "No remediation is available at this time." } ], "title": "X.509 Email Address Variable Length Buffer Overflow, Other Vulnerability" } ] }
gsd-2022-3602
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2022-3602", "id": "GSD-2022-3602", "references": [ "https://access.redhat.com/errata/RHSA-2022:7288", "https://access.redhat.com/errata/RHSA-2022:7384", "https://www.suse.com/security/cve/CVE-2022-3602.html" ] }, "gsd": { "database_specific": { "GSD": { "affected_component": "X.509 Email Address handling", "aliases": [ "CVE-2022-3602" ], "attack_vector": "network", "credit": "", "description": "X.509 Email Address 4-byte Buffer Overflow. CVE-2022-3602 was originally assessed by the OpenSSL project as CRITICAL as it is an arbitrary 4-byte stack buffer overflow, and such vulnerabilities may lead to remote code execution (RCE). \n\n During the week of prenotification, several organisations performed testing and gave us feedback on the issue, looking at the technical details of the overflow and stack layout on common architectures and platforms. \n\n Firstly, we had reports that on certain Linux distributions the stack layout was such that the 4 bytes overwrote an adjacent buffer that was yet to be used and therefore there was no crash or ability to cause remote code execution. \n\n Secondly, many modern platforms implement stack overflow protections which would mitigate against the risk of remote code execution and usually lead to a crash instead. \n\n However as OpenSSL is distributed as source code we have no way of knowing how every platform and compiler combination has arranged the buffers on the stack and therefore remote code execution may still be possible on some platforms. \n\n Our security policy states that a vulnerability might be described as CRITICAL if \u201cremote code execution is considered likely in common situations\u201d. We no longer felt that this rating applied to CVE-2022-3602 and therefore it was downgraded on 1st November 2022 before being released to HIGH.", "impact": "unknown", "notes": "X.509 Email Address 4-byte Buffer Overflow", "product_name": "openssl", "product_version": "3.0.5", "references": [ "https://mta.openssl.org/pipermail/openssl-announce/2022-October/000238.html", "https://github.com/NCSC-NL/OpenSSL-2022", "https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2022/2022-267005-1032.html", "https://github.com/pblumo/openssl-vuln-nov-2022/", "https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/", "https://github.com/openssl/openssl/commit/3b421ebc64c7b52f1b9feb3812bdc7781c784332", "https://www.openssl.org/source/openssl-3.0.7.tar.gz", "https://github.com/colmmacc/CVE-2022-3602", "https://twitter.com/hanno/status/1587775675397726209", "https://www.techsolvency.com/story-so-far/cve-tbd-openssl-3.0.7-critical/", "https://docs.google.com/spreadsheets/d/e/2PACX-1vT7ih8XJ5LHq-30saNCS9S7pJafe37S1b6ZRxWXcnx6HbrHFFTNIk7-gFQ7_NJlET47w0naS8deLtIG/pubhtml", "https://words.filippo.io/dispatches/openssl-punycode/" ], "vendor_name": "openssl", "vulnerability_type": "unknown" }, "OSV": { "affected": [ { "package": { "ecosystem": "GSD", "name": "openssl" }, "versions": [ "3.0.6", "3.0.5", "3.0.4", "3.0.3", "3.0.2", "3.0.1", "3.0.0", "3.0.0-beta2", "3.0.0-beta1", "3.0.0-alpha17", "3.0.0-alpha16", "3.0.0-alpha15", "3.0.0-alpha14", "3.0.0-alpha13", "3.0.0-alpha12", "3.0.0-alpha11", "3.0.0-alpha10", "3.0.0-alpha9", "3.0.0-alpha8", "3.0.0-alpha7", "3.0.0-alpha6", "3.0.0-alpha5", "3.0.0-alpha4", "3.0.0-alpha3", "3.0.0-alpha2", "3.0.0-alpha1" ] } ], "aliases": [ "CVE-2022-3602" ], "details": "X.509 Email Address 4-byte Buffer Overflow. CVE-2022-3602 was originally assessed by the OpenSSL project as CRITICAL as it is an arbitrary 4-byte stack buffer overflow, and such vulnerabilities may lead to remote code execution (RCE). \n\n During the week of prenotification, several organisations performed testing and gave us feedback on the issue, looking at the technical details of the overflow and stack layout on common architectures and platforms. \n\n Firstly, we had reports that on certain Linux distributions the stack layout was such that the 4 bytes overwrote an adjacent buffer that was yet to be used and therefore there was no crash or ability to cause remote code execution. \n\n Secondly, many modern platforms implement stack overflow protections which would mitigate against the risk of remote code execution and usually lead to a crash instead. \n\n However as OpenSSL is distributed as source code we have no way of knowing how every platform and compiler combination has arranged the buffers on the stack and therefore remote code execution may still be possible on some platforms. \n\n Our security policy states that a vulnerability might be described as CRITICAL if \u201cremote code execution is considered likely in common situations\u201d. We no longer felt that this rating applied to CVE-2022-3602 and therefore it was downgraded on 1st November 2022 before being released to HIGH.", "id": "CVE-2022-3602", "modified": "2022-11-02T15:48:10.308Z", "published": "2022-11-01T16:29:39.763Z", "references": [ { "type": "WEB", "url": "https://mta.openssl.org/pipermail/openssl-announce/2022-October/000238.html" }, { "type": "WEB", "url": "https://github.com/NCSC-NL/OpenSSL-2022" }, { "type": "WEB", "url": "https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2022/2022-267005-1032.html" }, { "type": "WEB", "url": "https://github.com/pblumo/openssl-vuln-nov-2022/" }, { "type": "ADVISORY", "url": "https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/" }, { "type": "FIX", "url": "https://github.com/openssl/openssl/commit/3b421ebc64c7b52f1b9feb3812bdc7781c784332" }, { "type": "FIX", "url": "https://www.openssl.org/source/openssl-3.0.7.tar.gz" }, { "type": "WEB", "url": "https://github.com/colmmacc/CVE-2022-3602" }, { "type": "WEB", "url": "https://twitter.com/hanno/status/1587775675397726209" }, { "type": "WEB", "url": "https://www.techsolvency.com/story-so-far/cve-tbd-openssl-3.0.7-critical/" }, { "type": "WEB", "url": "https://docs.google.com/spreadsheets/d/e/2PACX-1vT7ih8XJ5LHq-30saNCS9S7pJafe37S1b6ZRxWXcnx6HbrHFFTNIk7-gFQ7_NJlET47w0naS8deLtIG/pubhtml" }, { "type": "WEB", "url": "https://words.filippo.io/dispatches/openssl-punycode/" } ], "summary": "X.509 Email Address Variable Length Buffer Overflow." } }, "id": "GSD-2022-3602", "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "modified": "2022-11-01T16:53:33.077627Z", "osvSchema": { "aliases": [ "CVE-2022-3602" ], "details": "A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).", "id": "GSD-2022-3602", "modified": "2023-12-13T01:19:40.048098Z", "schema_version": "1.4.0" }, "references": [ { "type": "ADVISORY", "url": "https://mta.openssl.org/pipermail/openssl-announce/2022-October/000238.html" }, { "type": "ADVISORY", "url": "https://github.com/NCSC-NL/OpenSSL-2022" }, { "type": "ADVISORY", "url": "https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2022/2022-267005-1032.html" }, { "type": "ADVISORY", "url": "https://github.com/pblumo/openssl-vuln-nov-2022/" }, { "type": "ADVISORY", "url": "https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/" }, { "type": "FIX", "url": "https://github.com/openssl/openssl/commit/3b421ebc64c7b52f1b9feb3812bdc7781c784332" }, { "type": "FIX", "url": "https://www.openssl.org/source/openssl-3.0.7.tar.gz" }, { "type": "WEB", "url": "https://github.com/colmmacc/CVE-2022-3602" }, { "type": "WEB", "url": "https://twitter.com/hanno/status/1587775675397726209" }, { "type": "WEB", "url": "https://www.techsolvency.com/story-so-far/cve-tbd-openssl-3.0.7-critical/" }, { "type": "WEB", "url": "https://docs.google.com/spreadsheets/d/e/2PACX-1vT7ih8XJ5LHq-30saNCS9S7pJafe37S1b6ZRxWXcnx6HbrHFFTNIk7-gFQ7_NJlET47w0naS8deLtIG/pubhtml" }, { "type": "WEB", "url": "https://words.filippo.io/dispatches/openssl-punycode/" } ], "schema_version": "1.3.1" }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "openssl-security@openssl.org", "ID": "CVE-2022-3602", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OpenSSL", "version": { "version_data": [ { "version_affected": "=", "version_value": "Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6)" } ] } } ] }, "vendor_name": "OpenSSL" } ] } }, "credits": [ { "lang": "en", "value": "Polar Bear" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.openssl.org/news/secadv/20221101.txt", "refsource": "MISC", "url": "https://www.openssl.org/news/secadv/20221101.txt" }, { "name": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fe3b639dc19b325846f4f6801f2f4604f56e3de3", "refsource": "MISC", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fe3b639dc19b325846f4f6801f2f4604f56e3de3" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/01/15", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/01/15" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/01/16", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/01/16" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-W9sdCc2a", "refsource": "MISC", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-W9sdCc2a" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/01/21", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/01/21" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/01/19", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/01/19" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/01/18", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/01/18" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/01/20", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/01/20" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/01/24", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/01/24" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/01/17", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/01/17" }, { "name": "https://security.gentoo.org/glsa/202211-01", "refsource": "MISC", "url": "https://security.gentoo.org/glsa/202211-01" }, { "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0023", "refsource": "MISC", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0023" }, { "name": "https://www.kb.cert.org/vuls/id/794340", "refsource": "MISC", "url": "https://www.kb.cert.org/vuls/id/794340" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITS/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITS/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6S/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6S/" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/02/2", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/2" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/02/6", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/6" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/02/5", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/5" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/02/1", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/1" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/02/3", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/3" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/02/7", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/7" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/02/10", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/10" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/02/9", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/9" }, { "name": "http://packetstormsecurity.com/files/169687/OpenSSL-Security-Advisory-20221101.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/169687/OpenSSL-Security-Advisory-20221101.html" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/02/12", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/12" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/02/11", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/11" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/02/15", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/15" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/02/14", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/14" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/02/13", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/13" }, { "name": "https://security.netapp.com/advisory/ntap-20221102-0001/", "refsource": "MISC", "url": "https://security.netapp.com/advisory/ntap-20221102-0001/" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/03/1", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/03/1" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/03/2", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/03/2" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/03/3", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/03/3" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/03/5", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/03/5" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/03/7", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/03/7" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/03/6", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/03/6" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/03/9", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/03/9" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/03/10", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/03/10" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/03/11", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/03/11" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=3.0.0 \u003c3.0.7", "affected_versions": "All versions starting from 3.0.0 before 3.0.7", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-787", "CWE-937" ], "date": "2023-08-08", "description": "A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).", "fixed_versions": [ "3.0.7" ], "identifier": "CVE-2022-3602", "identifiers": [ "CVE-2022-3602" ], "not_impacted": "All versions before 3.0.0, all versions starting from 3.0.7", "package_slug": "conan/openssl", "pubdate": "2022-11-01", "solution": "Upgrade to version 3.0.7 or above.", "title": "X.509 Email Address 4-byte Buffer Overflow", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2022-3602", "https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/", "https://www.openssl.org/news/secadv/20221101.txt" ], "uuid": "851f9162-1ada-4574-9343-cd6326c3c595" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.0.7", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:19.0.0:*:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:18.12.0:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndExcluding": "18.11.0", "versionStartIncluding": "18.0.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "openssl-security@openssl.org", "ID": "CVE-2022-3602" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-120" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.openssl.org/news/secadv/20221101.txt", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://www.openssl.org/news/secadv/20221101.txt" }, { "name": "[oss-security] 20221101 OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/15" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/16" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/17" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/18" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/19" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/24" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/20" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/21" }, { "name": "20221028 Vulnerabilities in OpenSSL Affecting Cisco Products: November 2022", "refsource": "CISCO", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-W9sdCc2a" }, { "name": "GLSA-202211-01", "refsource": "GENTOO", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202211-01" }, { "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0023", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0023" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/1" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/2" }, { "name": "[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/3" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/5" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/6" }, { "name": "[oss-security] 20221102 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/9" }, { "name": "[oss-security] 20221102 Re: Fwd: Node.js security updates for all active release lines, November 2022", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/10" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/7" }, { "name": "http://packetstormsecurity.com/files/169687/OpenSSL-Security-Advisory-20221101.html", "refsource": "MISC", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/169687/OpenSSL-Security-Advisory-20221101.html" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/11" }, { "name": "[oss-security] 20221102 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/12" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/15" }, { "name": "[oss-security] 20221102 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/14" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/02/13" }, { "name": "https://security.netapp.com/advisory/ntap-20221102-0001/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221102-0001/" }, { "name": "VU#794340", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/794340" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/1" }, { "name": "[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/2" }, { "name": "[oss-security] 20221103 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/3" }, { "name": "[oss-security] 20221103 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/5" }, { "name": "[oss-security] 20221103 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/6" }, { "name": "[oss-security] 20221103 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/7" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6S/", "refsource": "MISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6S/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITS/", "refsource": "MISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITS/" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/03/11", "refsource": "MISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/11" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/03/10", "refsource": "MISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/10" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/03/9", "refsource": "MISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/03/9" }, { "name": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fe3b639dc19b325846f4f6801f2f4604f56e3de3", "refsource": "MISC", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fe3b639dc19b325846f4f6801f2f4604f56e3de3" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2023-01-19T15:48Z", "publishedDate": "2022-11-01T18:15Z" } } }
rhsa-2022_7384
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssl-container is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 03 November 2022]\nThis erratum was previously incorrectly marked as having a security impact of Critical, and it failed to mention all issues addressed in this update. The security impact of this erratum has been changed to Important, and CVE-2022-3786 was added to the CVE list. No changes have been made to the container image content.", "title": "Topic" }, { "category": "general", "text": "The ubi9/openssl image provides provides an openssl command-line tool for using the various functions of the OpenSSL crypto library. Using the OpenSSL tool, you can generate private keys, create certificate signing requests (CSRs), and display certificate information.\n\nThis updates the ubi9/openssl image in the Red Hat Container Registry.\n\nTo pull this container image, run one of the following commands:\n\n podman pull registry.redhat.io/rhel9/openssl (authenticated)\n podman pull registry.access.redhat.com/ubi9/openssl (unauthenticated)\n\nSecurity Fix(es):\n\n* OpenSSL: X.509 Email Address Buffer Overflow (CVE-2022-3602)\n\n* OpenSSL: X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:7384", "url": "https://access.redhat.com/errata/RHSA-2022:7384" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://catalog.redhat.com/software/containers/search", "url": "https://catalog.redhat.com/software/containers/search" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-004", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-004" }, { "category": "external", "summary": "2134869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134869" }, { "category": "external", "summary": "2137723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137723" }, { "category": "external", "summary": "2139104", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139104" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7384.json" } ], "title": "Red Hat Security Advisory: openssl-container security update", "tracking": { "current_release_date": "2024-11-06T01:54:31+00:00", "generator": { "date": "2024-11-06T01:54:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:7384", "initial_release_date": "2022-11-02T18:46:46+00:00", "revision_history": [ { "date": "2022-11-02T18:46:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-11-03T13:03:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T01:54:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64", "product": { "name": "ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64", "product_id": "ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64", "product_identification_helper": { "purl": "pkg:oci/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c?arch=arm64\u0026repository_url=registry.redhat.io/ubi9/openssl\u0026tag=9.0-25" } } }, { "category": "product_version", "name": "rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64", "product": { "name": "rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64", "product_id": "rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64", "product_identification_helper": { "purl": "pkg:oci/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c?arch=arm64\u0026repository_url=registry.redhat.io/rhel9/openssl\u0026tag=9.0-25" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x", "product": { "name": "ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x", "product_id": "ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x", "product_identification_helper": { "purl": "pkg:oci/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050?arch=s390x\u0026repository_url=registry.redhat.io/ubi9/openssl\u0026tag=9.0-25" } } }, { "category": "product_version", "name": "rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x", "product": { "name": "rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x", "product_id": "rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x", "product_identification_helper": { "purl": "pkg:oci/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050?arch=s390x\u0026repository_url=registry.redhat.io/rhel9/openssl\u0026tag=9.0-25" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le", "product": { "name": "ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le", "product_id": "ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le", "product_identification_helper": { "purl": "pkg:oci/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347?arch=ppc64le\u0026repository_url=registry.redhat.io/ubi9/openssl\u0026tag=9.0-25" } } }, { "category": "product_version", "name": "rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le", "product": { "name": "rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le", "product_id": "rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le", "product_identification_helper": { "purl": "pkg:oci/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347?arch=ppc64le\u0026repository_url=registry.redhat.io/rhel9/openssl\u0026tag=9.0-25" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64", "product": { "name": "ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64", "product_id": "ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64", "product_identification_helper": { "purl": "pkg:oci/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4?arch=amd64\u0026repository_url=registry.redhat.io/ubi9/openssl\u0026tag=9.0-25" } } }, { "category": "product_version", "name": "rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64", "product": { "name": "rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64", "product_id": "rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64", "product_identification_helper": { "purl": "pkg:oci/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4?arch=amd64\u0026repository_url=registry.redhat.io/rhel9/openssl\u0026tag=9.0-25" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64" }, "product_reference": "rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le" }, "product_reference": "rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64" }, "product_reference": "rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x" }, "product_reference": "rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64" }, "product_reference": "ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le" }, "product_reference": "ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64" }, "product_reference": "ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x" }, "product_reference": "ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ], "organization": "Polar Bear", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-3602", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2022-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2137723" } ], "notes": [ { "category": "description", "text": "A stack-based buffer overflow was found in the way OpenSSL processes X.509 certificates with a specially crafted email address field. This issue could cause a server or a client application compiled with OpenSSL to crash when trying to process the malicious certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: X.509 Email Address Buffer Overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "As per upstream, the most common situation where this can be triggered is when a server requests client authentication after a malicious client connects. A client connecting to a malicious server is also believed to be vulnerable in the same manner. Only OpenSSL versions 3.0.0 to 3.0.6 are vulnerable to this attack.\nThe OpenSSL binaries in Red Hat Enterprise Linux 9 are compiled with Stack Smashing Protection. Also during the build process, the compiler rearranges the variables in a way that the buffer overflow is only able to overwrite the stack canaries, limiting the maximum impact of this flaw to denial of service. Remote code execution may not be possible in such cases.\n\nRed Hat OpenStack Platform 17 does not ship OpenSSL and is not directly affected by the flaw. However, container images which product ship are of RHEL 9 which were affected. RHOSP have fixed this by respining container images through the following errata: https://access.redhat.com/errata/RHBA-2022:7429", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64", "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64", "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3602" }, { "category": "external", "summary": "RHBZ#2137723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137723" }, { "category": "external", "summary": "RHSB-2022-004", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-004" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3602", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3602" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3602", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3602" }, { "category": "external", "summary": "https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/", "url": "https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20221101.txt", "url": "https://www.openssl.org/news/secadv/20221101.txt" } ], "release_date": "2022-11-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-02T18:46:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64", "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64", "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64", "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64", "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenSSL: X.509 Email Address Buffer Overflow" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ], "organization": "Polar Bear", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-3786", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2022-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2139104" } ], "notes": [ { "category": "description", "text": "A stack-based buffer overflow was found in the way OpenSSL processes X.509 certificates with a specially crafted email address field. This issue could cause a server or a client application compiled with OpenSSL to crash or possibly execute remote code when trying to process the malicious certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: X.509 Email Address Variable Length Buffer Overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "As per upstream, the most common situation where this can be triggered is when a server requests client authentication after a malicious client connects. A client connecting to a malicious server is also believed to be vulnerable in the same manner. Only OpenSSL versions 3.0.0 to 3.0.6 are vulnerable to this attack.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64", "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64", "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3786" }, { "category": "external", "summary": "RHBZ#2139104", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139104" }, { "category": "external", "summary": "RHSB-2022-004", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-004" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3786", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3786" }, { "category": "external", "summary": "https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/", "url": "https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20221101.txt", "url": "https://www.openssl.org/news/secadv/20221101.txt" } ], "release_date": "2022-11-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-02T18:46:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64", "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64", "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64", "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64", "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64", "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenSSL: X.509 Email Address Variable Length Buffer Overflow" } ] }
rhsa-2022_7288
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssl is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full strength general purpose cryptography library.\n\nSecurity Fix(es):\n\n* OpenSSL: X.509 Email Address Buffer Overflow (CVE-2022-3602)\n\n* OpenSSL: X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:7288", "url": "https://access.redhat.com/errata/RHSA-2022:7288" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-004", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-004" }, { "category": "external", "summary": "2137723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137723" }, { "category": "external", "summary": "2139104", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139104" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7288.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-06T01:53:16+00:00", "generator": { "date": "2024-11-06T01:53:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:7288", "initial_release_date": "2022-11-01T18:40:16+00:00", "revision_history": [ { "date": "2022-11-01T18:40:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-11-01T18:40:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T01:53:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-1:3.0.1-43.el9_0.src", "product": { "name": "openssl-1:3.0.1-43.el9_0.src", "product_id": "openssl-1:3.0.1-43.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@3.0.1-43.el9_0?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-1:3.0.1-43.el9_0.aarch64", "product": { "name": "openssl-1:3.0.1-43.el9_0.aarch64", "product_id": "openssl-1:3.0.1-43.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@3.0.1-43.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:3.0.1-43.el9_0.aarch64", "product": { "name": "openssl-libs-1:3.0.1-43.el9_0.aarch64", "product_id": "openssl-libs-1:3.0.1-43.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@3.0.1-43.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:3.0.1-43.el9_0.aarch64", "product": { "name": "openssl-debugsource-1:3.0.1-43.el9_0.aarch64", "product_id": "openssl-debugsource-1:3.0.1-43.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@3.0.1-43.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:3.0.1-43.el9_0.aarch64", "product": { "name": "openssl-debuginfo-1:3.0.1-43.el9_0.aarch64", "product_id": "openssl-debuginfo-1:3.0.1-43.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@3.0.1-43.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.aarch64", "product": { "name": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.aarch64", "product_id": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@3.0.1-43.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:3.0.1-43.el9_0.aarch64", "product": { "name": "openssl-devel-1:3.0.1-43.el9_0.aarch64", "product_id": "openssl-devel-1:3.0.1-43.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@3.0.1-43.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:3.0.1-43.el9_0.aarch64", "product": { "name": "openssl-perl-1:3.0.1-43.el9_0.aarch64", "product_id": "openssl-perl-1:3.0.1-43.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@3.0.1-43.el9_0?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openssl-1:3.0.1-43.el9_0.ppc64le", "product": { "name": "openssl-1:3.0.1-43.el9_0.ppc64le", "product_id": "openssl-1:3.0.1-43.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@3.0.1-43.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:3.0.1-43.el9_0.ppc64le", "product": { "name": "openssl-libs-1:3.0.1-43.el9_0.ppc64le", "product_id": "openssl-libs-1:3.0.1-43.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@3.0.1-43.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:3.0.1-43.el9_0.ppc64le", "product": { "name": "openssl-debugsource-1:3.0.1-43.el9_0.ppc64le", "product_id": "openssl-debugsource-1:3.0.1-43.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@3.0.1-43.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:3.0.1-43.el9_0.ppc64le", "product": { "name": "openssl-debuginfo-1:3.0.1-43.el9_0.ppc64le", "product_id": "openssl-debuginfo-1:3.0.1-43.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@3.0.1-43.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.ppc64le", "product": { "name": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.ppc64le", "product_id": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@3.0.1-43.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:3.0.1-43.el9_0.ppc64le", "product": { "name": "openssl-devel-1:3.0.1-43.el9_0.ppc64le", "product_id": "openssl-devel-1:3.0.1-43.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@3.0.1-43.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:3.0.1-43.el9_0.ppc64le", "product": { "name": "openssl-perl-1:3.0.1-43.el9_0.ppc64le", "product_id": "openssl-perl-1:3.0.1-43.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@3.0.1-43.el9_0?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssl-1:3.0.1-43.el9_0.x86_64", "product": { "name": "openssl-1:3.0.1-43.el9_0.x86_64", "product_id": "openssl-1:3.0.1-43.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@3.0.1-43.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:3.0.1-43.el9_0.x86_64", "product": { "name": "openssl-libs-1:3.0.1-43.el9_0.x86_64", "product_id": "openssl-libs-1:3.0.1-43.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@3.0.1-43.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:3.0.1-43.el9_0.x86_64", "product": { "name": "openssl-debugsource-1:3.0.1-43.el9_0.x86_64", "product_id": "openssl-debugsource-1:3.0.1-43.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@3.0.1-43.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:3.0.1-43.el9_0.x86_64", "product": { "name": "openssl-debuginfo-1:3.0.1-43.el9_0.x86_64", "product_id": "openssl-debuginfo-1:3.0.1-43.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@3.0.1-43.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.x86_64", "product": { "name": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.x86_64", "product_id": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@3.0.1-43.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:3.0.1-43.el9_0.x86_64", "product": { "name": "openssl-devel-1:3.0.1-43.el9_0.x86_64", "product_id": "openssl-devel-1:3.0.1-43.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@3.0.1-43.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:3.0.1-43.el9_0.x86_64", "product": { "name": "openssl-perl-1:3.0.1-43.el9_0.x86_64", "product_id": "openssl-perl-1:3.0.1-43.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@3.0.1-43.el9_0?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-libs-1:3.0.1-43.el9_0.i686", "product": { "name": "openssl-libs-1:3.0.1-43.el9_0.i686", "product_id": "openssl-libs-1:3.0.1-43.el9_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@3.0.1-43.el9_0?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:3.0.1-43.el9_0.i686", "product": { "name": "openssl-debugsource-1:3.0.1-43.el9_0.i686", "product_id": "openssl-debugsource-1:3.0.1-43.el9_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@3.0.1-43.el9_0?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:3.0.1-43.el9_0.i686", "product": { "name": "openssl-debuginfo-1:3.0.1-43.el9_0.i686", "product_id": "openssl-debuginfo-1:3.0.1-43.el9_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@3.0.1-43.el9_0?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.i686", "product": { "name": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.i686", "product_id": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@3.0.1-43.el9_0?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:3.0.1-43.el9_0.i686", "product": { "name": "openssl-devel-1:3.0.1-43.el9_0.i686", "product_id": "openssl-devel-1:3.0.1-43.el9_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@3.0.1-43.el9_0?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-1:3.0.1-43.el9_0.s390x", "product": { "name": "openssl-1:3.0.1-43.el9_0.s390x", "product_id": "openssl-1:3.0.1-43.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@3.0.1-43.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:3.0.1-43.el9_0.s390x", "product": { "name": "openssl-libs-1:3.0.1-43.el9_0.s390x", "product_id": "openssl-libs-1:3.0.1-43.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@3.0.1-43.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:3.0.1-43.el9_0.s390x", "product": { "name": "openssl-debugsource-1:3.0.1-43.el9_0.s390x", "product_id": "openssl-debugsource-1:3.0.1-43.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@3.0.1-43.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:3.0.1-43.el9_0.s390x", "product": { "name": "openssl-debuginfo-1:3.0.1-43.el9_0.s390x", "product_id": "openssl-debuginfo-1:3.0.1-43.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@3.0.1-43.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.s390x", "product": { "name": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.s390x", "product_id": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@3.0.1-43.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:3.0.1-43.el9_0.s390x", "product": { "name": "openssl-devel-1:3.0.1-43.el9_0.s390x", "product_id": "openssl-devel-1:3.0.1-43.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@3.0.1-43.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:3.0.1-43.el9_0.s390x", "product": { "name": "openssl-perl-1:3.0.1-43.el9_0.s390x", "product_id": "openssl-perl-1:3.0.1-43.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@3.0.1-43.el9_0?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-1:3.0.1-43.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.aarch64" }, "product_reference": "openssl-1:3.0.1-43.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:3.0.1-43.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.ppc64le" }, "product_reference": "openssl-1:3.0.1-43.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:3.0.1-43.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.s390x" }, "product_reference": "openssl-1:3.0.1-43.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:3.0.1-43.el9_0.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.src" }, "product_reference": "openssl-1:3.0.1-43.el9_0.src", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:3.0.1-43.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.x86_64" }, "product_reference": "openssl-1:3.0.1-43.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:3.0.1-43.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.aarch64" }, "product_reference": "openssl-debuginfo-1:3.0.1-43.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:3.0.1-43.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.i686" }, "product_reference": "openssl-debuginfo-1:3.0.1-43.el9_0.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:3.0.1-43.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.ppc64le" }, "product_reference": "openssl-debuginfo-1:3.0.1-43.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:3.0.1-43.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.s390x" }, "product_reference": "openssl-debuginfo-1:3.0.1-43.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:3.0.1-43.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.x86_64" }, "product_reference": "openssl-debuginfo-1:3.0.1-43.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:3.0.1-43.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.aarch64" }, "product_reference": "openssl-debugsource-1:3.0.1-43.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:3.0.1-43.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.i686" }, "product_reference": "openssl-debugsource-1:3.0.1-43.el9_0.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:3.0.1-43.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.ppc64le" }, "product_reference": "openssl-debugsource-1:3.0.1-43.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:3.0.1-43.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.s390x" }, "product_reference": "openssl-debugsource-1:3.0.1-43.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:3.0.1-43.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.x86_64" }, "product_reference": "openssl-debugsource-1:3.0.1-43.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:3.0.1-43.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.aarch64" }, "product_reference": "openssl-devel-1:3.0.1-43.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:3.0.1-43.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.i686" }, "product_reference": "openssl-devel-1:3.0.1-43.el9_0.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:3.0.1-43.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.ppc64le" }, "product_reference": "openssl-devel-1:3.0.1-43.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:3.0.1-43.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.s390x" }, "product_reference": "openssl-devel-1:3.0.1-43.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:3.0.1-43.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.x86_64" }, "product_reference": "openssl-devel-1:3.0.1-43.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:3.0.1-43.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.aarch64" }, "product_reference": "openssl-libs-1:3.0.1-43.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:3.0.1-43.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.i686" }, "product_reference": "openssl-libs-1:3.0.1-43.el9_0.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:3.0.1-43.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.ppc64le" }, "product_reference": "openssl-libs-1:3.0.1-43.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:3.0.1-43.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.s390x" }, "product_reference": "openssl-libs-1:3.0.1-43.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:3.0.1-43.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.x86_64" }, "product_reference": "openssl-libs-1:3.0.1-43.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.aarch64" }, "product_reference": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.i686" }, "product_reference": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.ppc64le" }, "product_reference": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.s390x" }, "product_reference": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.x86_64" }, "product_reference": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:3.0.1-43.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.aarch64" }, "product_reference": "openssl-perl-1:3.0.1-43.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:3.0.1-43.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.ppc64le" }, "product_reference": "openssl-perl-1:3.0.1-43.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:3.0.1-43.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.s390x" }, "product_reference": "openssl-perl-1:3.0.1-43.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:3.0.1-43.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.x86_64" }, "product_reference": "openssl-perl-1:3.0.1-43.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:3.0.1-43.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.aarch64" }, "product_reference": "openssl-1:3.0.1-43.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:3.0.1-43.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.ppc64le" }, "product_reference": "openssl-1:3.0.1-43.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:3.0.1-43.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.s390x" }, "product_reference": "openssl-1:3.0.1-43.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:3.0.1-43.el9_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.src" }, "product_reference": "openssl-1:3.0.1-43.el9_0.src", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:3.0.1-43.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.x86_64" }, "product_reference": "openssl-1:3.0.1-43.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:3.0.1-43.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.aarch64" }, "product_reference": "openssl-debuginfo-1:3.0.1-43.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:3.0.1-43.el9_0.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.i686" }, "product_reference": "openssl-debuginfo-1:3.0.1-43.el9_0.i686", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:3.0.1-43.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.ppc64le" }, "product_reference": "openssl-debuginfo-1:3.0.1-43.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:3.0.1-43.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.s390x" }, "product_reference": "openssl-debuginfo-1:3.0.1-43.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:3.0.1-43.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.x86_64" }, "product_reference": "openssl-debuginfo-1:3.0.1-43.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:3.0.1-43.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.aarch64" }, "product_reference": "openssl-debugsource-1:3.0.1-43.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:3.0.1-43.el9_0.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.i686" }, "product_reference": "openssl-debugsource-1:3.0.1-43.el9_0.i686", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:3.0.1-43.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.ppc64le" }, "product_reference": "openssl-debugsource-1:3.0.1-43.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:3.0.1-43.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.s390x" }, "product_reference": "openssl-debugsource-1:3.0.1-43.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:3.0.1-43.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.x86_64" }, "product_reference": "openssl-debugsource-1:3.0.1-43.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:3.0.1-43.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.aarch64" }, "product_reference": "openssl-devel-1:3.0.1-43.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:3.0.1-43.el9_0.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.i686" }, "product_reference": "openssl-devel-1:3.0.1-43.el9_0.i686", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:3.0.1-43.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.ppc64le" }, "product_reference": "openssl-devel-1:3.0.1-43.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:3.0.1-43.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.s390x" }, "product_reference": "openssl-devel-1:3.0.1-43.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:3.0.1-43.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.x86_64" }, "product_reference": "openssl-devel-1:3.0.1-43.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:3.0.1-43.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.aarch64" }, "product_reference": "openssl-libs-1:3.0.1-43.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:3.0.1-43.el9_0.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.i686" }, "product_reference": "openssl-libs-1:3.0.1-43.el9_0.i686", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:3.0.1-43.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.ppc64le" }, "product_reference": "openssl-libs-1:3.0.1-43.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:3.0.1-43.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.s390x" }, "product_reference": "openssl-libs-1:3.0.1-43.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:3.0.1-43.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.x86_64" }, "product_reference": "openssl-libs-1:3.0.1-43.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.aarch64" }, "product_reference": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.i686" }, "product_reference": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.i686", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.ppc64le" }, "product_reference": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.s390x" }, "product_reference": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.x86_64" }, "product_reference": "openssl-libs-debuginfo-1:3.0.1-43.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:3.0.1-43.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.aarch64" }, "product_reference": "openssl-perl-1:3.0.1-43.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:3.0.1-43.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.ppc64le" }, "product_reference": "openssl-perl-1:3.0.1-43.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:3.0.1-43.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.s390x" }, "product_reference": "openssl-perl-1:3.0.1-43.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:3.0.1-43.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.x86_64" }, "product_reference": "openssl-perl-1:3.0.1-43.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ], "organization": "Polar Bear", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-3602", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2022-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2137723" } ], "notes": [ { "category": "description", "text": "A stack-based buffer overflow was found in the way OpenSSL processes X.509 certificates with a specially crafted email address field. This issue could cause a server or a client application compiled with OpenSSL to crash when trying to process the malicious certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: X.509 Email Address Buffer Overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "As per upstream, the most common situation where this can be triggered is when a server requests client authentication after a malicious client connects. A client connecting to a malicious server is also believed to be vulnerable in the same manner. Only OpenSSL versions 3.0.0 to 3.0.6 are vulnerable to this attack.\nThe OpenSSL binaries in Red Hat Enterprise Linux 9 are compiled with Stack Smashing Protection. Also during the build process, the compiler rearranges the variables in a way that the buffer overflow is only able to overwrite the stack canaries, limiting the maximum impact of this flaw to denial of service. Remote code execution may not be possible in such cases.\n\nRed Hat OpenStack Platform 17 does not ship OpenSSL and is not directly affected by the flaw. However, container images which product ship are of RHEL 9 which were affected. RHOSP have fixed this by respining container images through the following errata: https://access.redhat.com/errata/RHBA-2022:7429", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3602" }, { "category": "external", "summary": "RHBZ#2137723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137723" }, { "category": "external", "summary": "RHSB-2022-004", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-004" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3602", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3602" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3602", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3602" }, { "category": "external", "summary": "https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/", "url": "https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20221101.txt", "url": "https://www.openssl.org/news/secadv/20221101.txt" } ], "release_date": "2022-11-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-01T18:40:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7288" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenSSL: X.509 Email Address Buffer Overflow" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ], "organization": "Polar Bear", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-3786", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2022-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2139104" } ], "notes": [ { "category": "description", "text": "A stack-based buffer overflow was found in the way OpenSSL processes X.509 certificates with a specially crafted email address field. This issue could cause a server or a client application compiled with OpenSSL to crash or possibly execute remote code when trying to process the malicious certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: X.509 Email Address Variable Length Buffer Overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "As per upstream, the most common situation where this can be triggered is when a server requests client authentication after a malicious client connects. A client connecting to a malicious server is also believed to be vulnerable in the same manner. Only OpenSSL versions 3.0.0 to 3.0.6 are vulnerable to this attack.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3786" }, { "category": "external", "summary": "RHBZ#2139104", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139104" }, { "category": "external", "summary": "RHSB-2022-004", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-004" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3786", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3786" }, { "category": "external", "summary": "https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/", "url": "https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20221101.txt", "url": "https://www.openssl.org/news/secadv/20221101.txt" } ], "release_date": "2022-11-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-01T18:40:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7288" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debuginfo-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-debugsource-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-devel-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.i686", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-libs-debuginfo-1:3.0.1-43.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:openssl-perl-1:3.0.1-43.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenSSL: X.509 Email Address Variable Length Buffer Overflow" } ] }
ghsa-8rwr-x37p-mx23
Vulnerability from github
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution.
Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler.
Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible.
In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.
{ "affected": [ { "package": { "ecosystem": "crates.io", "name": "openssl-src" }, "ranges": [ { "events": [ { "introduced": "300.0.0" }, { "fixed": "300.0.11" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-3602" ], "database_specific": { "cwe_ids": [ "CWE-120", "CWE-787" ], "github_reviewed": true, "github_reviewed_at": "2022-11-01T17:45:59Z", "nvd_published_at": "2022-11-01T18:15:00Z", "severity": "CRITICAL" }, "details": "A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs\nafter certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to\ncontinue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address\nto overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or\npotentially remote code execution.\n\nMany platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler.\n\nPre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible.\n\nIn a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.\n", "id": "GHSA-8rwr-x37p-mx23", "modified": "2022-11-07T21:28:54Z", "published": "2022-11-01T17:45:59Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3602" }, { "type": "WEB", "url": "https://github.com/rustsec/advisory-db/pull/1452" }, { "type": "WEB", "url": "https://github.com/alexcrichton/openssl-src-rs/commit/4a31c14f31e1a08c18893a37e304dd1dd4b7daa3" }, { "type": "WEB", "url": "https://github.com/openssl/openssl/commit/fe3b639dc19b325846f4f6801f2f4604f56e3de3" }, { "type": "WEB", "url": "https://www.openssl.org/news/secadv/20221101.txt" }, { "type": "WEB", "url": "https://www.kb.cert.org/vuls/id/794340" }, { "type": "WEB", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-W9sdCc2a" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20221102-0001" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202211-01" }, { "type": "WEB", "url": "https://rustsec.org/advisories/RUSTSEC-2022-0064.html" }, { "type": "WEB", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0023" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITS" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6S" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITS" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6S" }, { "type": "PACKAGE", "url": "https://github.com/alexcrichton/openssl-src-rs" }, { "type": "WEB", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fe3b639dc19b325846f4f6801f2f4604f56e3de3" }, { "type": "WEB", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fe3b639dc19b325846f4f6801f2f4604f56e3de3" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/169687/OpenSSL-Security-Advisory-20221101.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/01/15" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/01/16" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/01/17" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/01/18" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/01/19" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/01/20" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/01/21" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/01/24" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/10" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/11" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/12" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/13" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/14" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/15" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/2" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/3" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/5" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/6" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/7" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/02/9" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/03/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/03/10" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/03/11" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/03/2" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/03/3" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/03/5" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/03/6" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/03/7" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/03/9" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "X.509 Email Address 4-byte Buffer Overflow" }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.