{"api_version":"1","generated_at":"2026-04-23T06:19:30+00:00","cve":"CVE-2022-3786","urls":{"html":"https://cve.report/CVE-2022-3786","api":"https://cve.report/api/cve/CVE-2022-3786.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-3786","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-3786"},"summary":{"title":"X.509 Email Address Variable Length Buffer Overflow","description":"A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.","state":"PUBLISHED","assigner":"openssl","published_at":"2022-11-01 18:15:11","updated_at":"2026-04-14 10:16:26"},"problem_types":["CWE-120","Buffer overflow","CWE-120 CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}},{"version":"3.1","source":"ADP","type":"DECLARED","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}}],"references":[{"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c42165b5706e42f67ef8ef4c351a9a4c5d21639a","name":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c42165b5706e42f67ef8ef4c351a9a4c5d21639a","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"git.openssl.org Git - openssl.git/commitdiff","mime":"text/xml","httpstatus":"200","archivestatus":"404"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-408105.html","name":"https://cert-portal.siemens.com/productcert/html/ssa-408105.html","refsource":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.openssl.org/news/secadv/20221101.txt","name":"https://www.openssl.org/news/secadv/20221101.txt","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"https://www.kb.cert.org/vuls/id/794340","name":"https://www.kb.cert.org/vuls/id/794340","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"VU#794340 - OpenSSL 3.0.0 to 3.0.6 decodes some punycode email addresses in X.509 certificates improperly","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00789.html","name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00789.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-W9sdCc2a","name":"CISCO:20221028 Vulnerabilities in OpenSSL Affecting Cisco Products: November 2022","refsource":"MITRE","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0023","name":"CONFIRM:https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0023","refsource":"MITRE","tags":[],"title":"Security Advisory","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.netapp.com/advisory/ntap-20221102-0001/","name":"CONFIRM:https://security.netapp.com/advisory/ntap-20221102-0001/","refsource":"MITRE","tags":[],"title":"November 2022 OpenSSL Vulnerabilities in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITS/","name":"FEDORA:FEDORA-2022-0f1d2e0537","refsource":"MITRE","tags":[],"title":"[SECURITY] Fedora 37 Update: openssl-3.0.5-3.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6S/","name":"FEDORA:FEDORA-2022-502f096dce","refsource":"MITRE","tags":[],"title":"[SECURITY] Fedora 36 Update: openssl-3.0.5-2.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.gentoo.org/glsa/202211-01","name":"GENTOO:GLSA-202211-01","refsource":"MITRE","tags":[],"title":"OpenSSL: Multiple Vulnerabilities (GLSA 202211-01) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://packetstormsecurity.com/files/169687/OpenSSL-Security-Advisory-20221101.html","name":"MISC:http://packetstormsecurity.com/files/169687/OpenSSL-Security-Advisory-20221101.html","refsource":"MITRE","tags":[],"title":"OpenSSL Security Advisory 20221101 ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/03/10","name":"MISC:http://www.openwall.com/lists/oss-security/2022/11/03/10","refsource":"MITRE","tags":[],"title":"oss-security - Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow\n (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow\n (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/03/11","name":"MISC:http://www.openwall.com/lists/oss-security/2022/11/03/11","refsource":"MITRE","tags":[],"title":"oss-security - Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow\n (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow\n (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/03/9","name":"MISC:http://www.openwall.com/lists/oss-security/2022/11/03/9","refsource":"MITRE","tags":[],"title":"oss-security - Re: Re: OpenSSL X.509 Email Address 4-byte Buffer\n Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer\n Overflow (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=c42165b5706e42f67ef8ef4c351a9a4c5d21639a","name":"MISC:https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=c42165b5706e42f67ef8ef4c351a9a4c5d21639a","refsource":"MITRE","tags":[],"title":"git.openssl.org Git","mime":"text/xml","httpstatus":"404","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6S/","name":"MISC:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6S/","refsource":"MITRE","tags":[],"title":"[SECURITY] Fedora 36 Update: openssl-3.0.5-2.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITS/","name":"MISC:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITS/","refsource":"MITRE","tags":[],"title":"[SECURITY] Fedora 37 Update: openssl-3.0.5-3.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/01/15","name":"MLIST:[oss-security] 20221101 OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/01/16","name":"MLIST:[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: OpenSSL X.509 Email Address 4-byte Buffer\n Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer\n Overflow (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/01/18","name":"MLIST:[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow\n (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/01/19","name":"MLIST:[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: OpenSSL X.509 Email Address 4-byte Buffer\n Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer\n Overflow (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/02/3","name":"MLIST:[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: OpenSSL X.509 Email Address 4-byte Buffer\n Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer\n Overflow (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/01/20","name":"MLIST:[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow\n (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow\n (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/01/21","name":"MLIST:[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow\n (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/01/24","name":"MLIST:[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: OpenSSL X.509 Email Address 4-byte Buffer\n Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer\n Overflow (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/02/1","name":"MLIST:[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: OpenSSL X.509 Email Address 4-byte Buffer\n Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer\n Overflow (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/02/2","name":"MLIST:[oss-security] 20221101 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow\n (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/02/10","name":"MLIST:[oss-security] 20221102 Re: Fwd: Node.js security updates for all active release lines, November 2022","refsource":"MITRE","tags":[],"title":"oss-security - Re: Fwd: Node.js security updates for all active\n release lines, November 2022","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/02/7","name":"MLIST:[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow\n (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow\n (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/01/17","name":"MLIST:[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow\n (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow\n (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/02/11","name":"MLIST:[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: OpenSSL X.509 Email Address 4-byte Buffer\n Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer\n Overflow (CVE-2022-3786)","mime":"text/x-c","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/02/13","name":"MLIST:[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow\n (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow\n (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/02/15","name":"MLIST:[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: OpenSSL X.509 Email Address 4-byte Buffer\n Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer\n Overflow (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/03/2","name":"MLIST:[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: OpenSSL X.509 Email Address 4-byte Buffer\n Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer\n Overflow (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/02/5","name":"MLIST:[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: OpenSSL X.509 Email Address 4-byte Buffer\n Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer\n Overflow (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/03/1","name":"MLIST:[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: OpenSSL X.509 Email Address 4-byte Buffer\n Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow\n (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/02/6","name":"MLIST:[oss-security] 20221102 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: OpenSSL X.509 Email Address 4-byte Buffer\n Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer\n Overflow (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/02/14","name":"MLIST:[oss-security] 20221102 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: Re: OpenSSL X.509 Email Address 4-byte Buffer\n Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/02/12","name":"MLIST:[oss-security] 20221102 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: Re: OpenSSL X.509 Email Address 4-byte\n Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer\n Overflow (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/02/9","name":"MLIST:[oss-security] 20221102 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: Re: OpenSSL X.509 Email Address 4-byte Buffer\n Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/03/5","name":"MLIST:[oss-security] 20221103 Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow\n (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow\n (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/03/7","name":"MLIST:[oss-security] 20221103 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: Re: OpenSSL X.509 Email Address 4-byte Buffer\n Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/03/6","name":"MLIST:[oss-security] 20221103 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: Re: OpenSSL X.509 Email Address 4-byte Buffer\n Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer\n Overflow (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/11/03/3","name":"MLIST:[oss-security] 20221103 Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","refsource":"MITRE","tags":[],"title":"oss-security - Re: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-3786","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3786","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"OpenSSL","product":"OpenSSL","version":"affected 3.0.0 3.0.7 semver","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"Calibre ICE","version":"affected V2022.4 V2023.1 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"Mcenter","version":"affected V5.2.1 V5.3.0 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE X204RNA (HSR)","version":"affected V3.2.7 V3.2.8 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE X204RNA (PRP)","version":"affected V3.2.7 V3.2.8 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE X204RNA EEC (HSR)","version":"affected V3.2.7 V3.2.8 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE X204RNA EEC (PRP)","version":"affected V3.2.7 V3.2.8 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE X204RNA EEC (PRP/HSR)","version":"affected V3.2.7 V3.2.8 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SICAM GridPass","version":"affected V1.80 V2.20 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIMATIC RTLS Locating Manager","version":"affected V2.13.0.0 V2.13.0.3 custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Viktor Dukhovni","lang":"en"}],"nvd_cpes":[{"cve_year":"2022","cve_id":"3786","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"36","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3786","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"37","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3786","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nodejs","cpe5":"node.js","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3786","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nodejs","cpe5":"node.js","cpe6":"18.12.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3786","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nodejs","cpe5":"node.js","cpe6":"19.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3786","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2022","cve_id":"3786","cve":"CVE-2022-3786","epss":"0.214280000","percentile":"0.957120000","score_date":"2026-04-15","updated_at":"2026-04-16 00:13:56"},"legacy_qids":[{"cve":"CVE-2022-3786","qid":"160191","title":"Oracle Enterprise Linux Security Update for Open Secure Sockets Layer (OpenSSL) (ELSA-2022-7288)"},{"cve":"CVE-2022-3786","qid":"160192","title":"Oracle Enterprise Linux Security Update for Open Secure Sockets Layer (OpenSSL) (ELSA-2022-9968)"},{"cve":"CVE-2022-3786","qid":"160258","title":"Oracle Enterprise Linux Security Update for Open Secure Sockets Layer (OpenSSL) (ELSA-2022-10004)"},{"cve":"CVE-2022-3786","qid":"184506","title":"Debian Security Update for Open Secure Sockets Layer (OpenSSL) (CVE-2022-3786)"},{"cve":"CVE-2022-3786","qid":"199012","title":"Ubuntu Security Notification for Open Secure Sockets Layer (OpenSSL) Vulnerabilities (USN-5710-1)"},{"cve":"CVE-2022-3786","qid":"199113","title":"Ubuntu Security Notification for Open Secure Sockets Layer (OpenSSL) Vulnerabilities (USN-5710-1)"},{"cve":"CVE-2022-3786","qid":"199114","title":"Ubuntu Security Notification for Open Secure Sockets Layer (OpenSSL) Vulnerabilities (USN-5710-1)"},{"cve":"CVE-2022-3786","qid":"199115","title":"Ubuntu Security Notification for Open Secure Sockets Layer (OpenSSL) Vulnerabilities (USN-5710-1)"},{"cve":"CVE-2022-3786","qid":"199116","title":"Ubuntu Security Notification for Open Secure Sockets Layer (OpenSSL) Vulnerabilities (USN-5710-1)"},{"cve":"CVE-2022-3786","qid":"199117","title":"Ubuntu Security Notification for Open Secure Sockets Layer (OpenSSL) Vulnerabilities (USN-5710-1)"},{"cve":"CVE-2022-3786","qid":"240798","title":"Red Hat Update for Open Secure Sockets Layer (OpenSSL) (RHSA-2022:7288)"},{"cve":"CVE-2022-3786","qid":"283270","title":"Fedora Security Update for Open Secure Sockets Layer (OpenSSL) (FEDORA-2022-502f096dce)"},{"cve":"CVE-2022-3786","qid":"283442","title":"Fedora Security Update for Open Secure Sockets Layer (OpenSSL) (FEDORA-2022-0f1d2e0537)"},{"cve":"CVE-2022-3786","qid":"296086","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 51.132.1 Missing (CPUOCT2022)"},{"cve":"CVE-2022-3786","qid":"296098","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 52.132.2 Missing (CPUOCT2022)"},{"cve":"CVE-2022-3786","qid":"330128","title":"IBM AIX Multiple Vulnerabilities in Open Secure Sockets Layer (OpenSSL) (openssl_advisory37)"},{"cve":"CVE-2022-3786","qid":"354102","title":"Amazon Linux Security Advisory for Open Secure Sockets Layer (OpenSSL) : ALAS2022-2022-157"},{"cve":"CVE-2022-3786","qid":"354404","title":"Amazon Linux Security Advisory for Open Secure Sockets Layer (OpenSSL) : ALAS2022-2022-157"},{"cve":"CVE-2022-3786","qid":"355250","title":"Amazon Linux Security Advisory for Open Secure Sockets Layer (OpenSSL) : ALAS2023-2023-051"},{"cve":"CVE-2022-3786","qid":"355273","title":"Amazon Linux Security Advisory for nodejs : ALAS2023-2023-084"},{"cve":"CVE-2022-3786","qid":"377733","title":"Open Secure Sockets Layer (OpenSSL) Less Than 3.0.7 Buffer Overflow Vulnerability (Scan Utility)"},{"cve":"CVE-2022-3786","qid":"377881","title":"Node.js Multiple Vulnerabilities (November 2022)"},{"cve":"CVE-2022-3786","qid":"377934","title":"Node.js Multiple Vulnerabilities (November 2022)"},{"cve":"CVE-2022-3786","qid":"38879","title":"Open Secure Sockets Layer (OpenSSL) Less Than 3.0.7 Buffer Overflow Vulnerability"},{"cve":"CVE-2022-3786","qid":"43945","title":"FortiOS - Unauthorized Command Execution Vulnerability (FG-IR-22-419)"},{"cve":"CVE-2022-3786","qid":"502587","title":"Alpine Linux Security Update for Open Secure Sockets Layer3 (OpenSSL3)"},{"cve":"CVE-2022-3786","qid":"502747","title":"Alpine Linux Security Update for nodejs"},{"cve":"CVE-2022-3786","qid":"502755","title":"Alpine Linux Security Update for openssl"},{"cve":"CVE-2022-3786","qid":"503688","title":"Alpine Linux Security Update for openssl3"},{"cve":"CVE-2022-3786","qid":"520001","title":"Open Secure Sockets Layer (OpenSSL) Multiple Vulnerabilities (CVE-2022-3602, CVE-2022-3786)"},{"cve":"CVE-2022-3786","qid":"591335","title":"Hitachi Energy PCU400 Reliance on Uncontrolled Component Multiple Vulnerabilities (ICSA-23-019-01, 8DBD 000137)"},{"cve":"CVE-2022-3786","qid":"690972","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for Open Secure Sockets Layer (OpenSSL) (0844671c-5a09-11ed-856e-d4c9ef517024)"},{"cve":"CVE-2022-3786","qid":"710678","title":"Gentoo Linux Open Secure Sockets Layer (OpenSSL) Multiple Vulnerabilities (GLSA 202211-01)"},{"cve":"CVE-2022-3786","qid":"752752","title":"SUSE Enterprise Linux Security Update for Open Secure Sockets Layer (OpenSSL-3) (SUSE-SU-2022:3843-1)"},{"cve":"CVE-2022-3786","qid":"753024","title":"SUSE Enterprise Linux Security Update for openssl-3 (SUSE-SU-2022:4586-1)"},{"cve":"CVE-2022-3786","qid":"940723","title":"AlmaLinux Security Update for Open Secure Sockets Layer (OpenSSL) (ALSA-2022:7288)"},{"cve":"CVE-2022-3786","qid":"960515","title":"Rocky Linux Security Update for Open Secure Sockets Layer (OpenSSL) (RLSA-2022:7288)"}]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2025-11-04T19:13:08.687Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"OpenSSL Advisory","tags":["vendor-advisory","x_transferred"],"url":"https://www.openssl.org/news/secadv/20221101.txt"},{"name":"3.0.7 git commit","tags":["patch","x_transferred"],"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c42165b5706e42f67ef8ef4c351a9a4c5d21639a"},{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00789.html"},{"url":"https://www.kb.cert.org/vuls/id/794340"}],"title":"CVE Program Container"},{"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},{"other":{"content":{"id":"CVE-2022-3786","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2025-04-23T13:26:54.639858Z","version":"2.0.3"},"type":"ssvc"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-120","description":"CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2025-05-05T16:12:38.194Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"},{"affected":[{"defaultStatus":"unknown","product":"Calibre ICE","vendor":"Siemens","versions":[{"lessThan":"V2023.1","status":"affected","version":"V2022.4","versionType":"custom"}]},{"defaultStatus":"unknown","product":"Mcenter","vendor":"Siemens","versions":[{"lessThan":"V5.3.0","status":"affected","version":"V5.2.1","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE X204RNA (HSR)","vendor":"Siemens","versions":[{"lessThan":"V3.2.8","status":"affected","version":"V3.2.7","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE X204RNA (PRP)","vendor":"Siemens","versions":[{"lessThan":"V3.2.8","status":"affected","version":"V3.2.7","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE X204RNA EEC (HSR)","vendor":"Siemens","versions":[{"lessThan":"V3.2.8","status":"affected","version":"V3.2.7","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE X204RNA EEC (PRP)","vendor":"Siemens","versions":[{"lessThan":"V3.2.8","status":"affected","version":"V3.2.7","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE X204RNA EEC (PRP/HSR)","vendor":"Siemens","versions":[{"lessThan":"V3.2.8","status":"affected","version":"V3.2.7","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SICAM GridPass","vendor":"Siemens","versions":[{"lessThan":"V2.20","status":"affected","version":"V1.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIMATIC RTLS Locating Manager","vendor":"Siemens","versions":[{"lessThan":"V2.13.0.3","status":"affected","version":"V2.13.0.0","versionType":"custom"}]}],"providerMetadata":{"dateUpdated":"2026-04-14T08:58:03.787Z","orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP"},"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-408105.html"}],"x_adpType":"supplier"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"OpenSSL","vendor":"OpenSSL","versions":[{"lessThan":"3.0.7","status":"affected","version":"3.0.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Viktor Dukhovni"}],"datePublic":"2022-11-01T00:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.</p>"}],"value":"A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.\n\n"}],"metrics":[{"format":"other","other":{"content":{"text":"HIGH"},"type":"https://www.openssl.org/policies/secpolicy.html#high"}}],"problemTypes":[{"descriptions":[{"description":"Buffer overflow","lang":"en"}]}],"providerMetadata":{"dateUpdated":"2022-11-04T07:28:32.835Z","orgId":"3a12439a-ef3a-4c79-92e6-6081a721f1e5","shortName":"openssl"},"references":[{"name":"OpenSSL Advisory","tags":["vendor-advisory"],"url":"https://www.openssl.org/news/secadv/20221101.txt"},{"name":"3.0.7 git commit","tags":["patch"],"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c42165b5706e42f67ef8ef4c351a9a4c5d21639a"}],"source":{"discovery":"UNKNOWN"},"title":"X.509 Email Address Variable Length Buffer Overflow","x_generator":{"engine":"Vulnogram 0.1.0-dev","importer":"vulnxml2json5.py 2022-11-04 07:19:07.034873"}}},"cveMetadata":{"assignerOrgId":"3a12439a-ef3a-4c79-92e6-6081a721f1e5","assignerShortName":"openssl","cveId":"CVE-2022-3786","datePublished":"2022-11-01T00:00:00.000Z","dateReserved":"2022-11-01T00:00:00.000Z","dateUpdated":"2026-04-14T08:58:03.787Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2022-11-01 18:15:11","lastModifiedDate":"2026-04-14 10:16:26","problem_types":["CWE-120","Buffer overflow","CWE-120 CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')"],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0.0","versionEndExcluding":"3.0.7","matchCriteriaId":"BE1F59CA-02F2-4374-A129-18713496B58B"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*","matchCriteriaId":"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"},{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*","matchCriteriaId":"E30D0E6F-4AE8-4284-8716-991DFA48CC5D"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*","versionStartIncluding":"18.0.0","versionEndExcluding":"18.11.0","matchCriteriaId":"CAC42CA8-8B01-4A19-A83C-A7D4D08E5E43"},{"vulnerable":true,"criteria":"cpe:2.3:a:nodejs:node.js:18.12.0:*:*:*:lts:*:*:*","matchCriteriaId":"7B1F87EE-4E30-4832-BF01-8501E94380EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:nodejs:node.js:19.0.0:*:*:*:-:*:*:*","matchCriteriaId":"F568BBC5-0D8E-499C-9F3E-DDCE5F10F9D5"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"3786","Ordinal":"1","Title":"X.509 Email Address Variable Length Buffer Overflow","CVE":"CVE-2022-3786","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"3786","Ordinal":"1","NoteData":"A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.","Type":"Description","Title":"X.509 Email Address Variable Length Buffer Overflow"}]}}}