VID |
210230 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The version of OpenSSL installed on the remote host is prior to 3.0.8. It is, therefore, affected by a denial of service (DoS) vulnerability.
If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of service when the affected process hangs. Policy processing being enabled on a publicly facing server is not considered to be a common setup. Policy processing is enabled by passing the -policy argument to the command line utilities or by calling either X509_VERIFY_PARAM_add0_policy() or X509_VERIFY_PARAM_set1_policies() functions. Note that due to the low severity of the issue, no fix was available at the time the advisory was published. A fix will be present in 3.0.8.
* References: https://cve.org/CVERecord?id=CVE-2022-3358 http://www.nessus.org/u?8748528d https://www.openssl.org/news/secadv/20221213.txt
* Platforms Affected: OpenSSL 3.0.x before 3.0.8 Linux Any version Unix Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of OpenSSL (3.0.8 or later), available from the OpenSSL Web site at http://www.openssl.org/ |
Related URL |
CVE-2022-3996 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|