QID 38879

Date Published: 2022-10-31

QID 38879: Open Secure Sockets Layer (OpenSSL) Less Than 3.0.7 Buffer Overflow Vulnerability

OpenSSL has released a high severity security advisory addressing two buffer overrun vulnerabilities (CVE-2022-3602 and CVE-2022-3786) that can be triggered in X.509 certificate verification, specifically in name constraint checking. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution.

Affected Versions:
OpenSSL 3.0.x versions prior to version 3.0.7

QID Detection Logic: Linux (Authenticated)
This QID checks for vulnerable version of OpenSSL by running 'openssl version' command.

QID Detection Logic: Windows (Authenticated)
This QID checks for vulnerable version of OpenSSL by checking the OpenSSL DisplayName value by enumerating the registry keys:
"HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall"
"HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall".

QID Detection Logic: (Unauthenticated)
This QID checks for vulnerable version of OpenSSL by extracting openssl version from http response header.

Vulnerable version of OpenSSL may allow an attacker to perform a buffer overflow attack that could result in a crash (causing a denial of service) or potentially remote code execution.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Vendor has released a patch to address these vulnerabilities. Customers are advised to refer to OpenSSL Security Advisory for more information pertaining to this

    Vendor References

    CVEs related to QID 38879

    Software Advisories
    Advisory ID Software Component Link
    OpenSSL 3.0.7 URL Logo www.openssl.org/news/secadv/20221101.txt