Korean
<< Back
VID 210230
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The version of OpenSSL installed on the remote host is prior to 3.0.8. It is, therefore, affected by a denial of service (DoS) vulnerability.

If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of service when the affected process hangs. Policy processing being enabled on a publicly facing server is not considered to be a common setup. Policy processing is enabled by passing the -policy argument to the command line utilities or by calling either X509_VERIFY_PARAM_add0_policy() or X509_VERIFY_PARAM_set1_policies() functions.
Note that due to the low severity of the issue, no fix was available at the time the advisory was published. A fix will be present in 3.0.8.

* References:
https://cve.org/CVERecord?id=CVE-2022-3358
http://www.nessus.org/u?8748528d
https://www.openssl.org/news/secadv/20221213.txt

* Platforms Affected:
OpenSSL 3.0.x before 3.0.8
Linux Any version
Unix Any version
Microsoft Windows Any version
Recommendation Upgrade to the latest version of OpenSSL (3.0.8 or later), available from the OpenSSL Web site at http://www.openssl.org/
Related URL CVE-2022-3996 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)