Lucene search

K
githubGitHub Advisory DatabaseGHSA-VR8J-HGMM-JH9R
HistoryDec 13, 2022 - 6:30 p.m.

openssl-src subject to DoS by double-checked locking

2022-12-1318:30:33
CWE-667
GitHub Advisory Database
github.com
13
openssl
x.509 certificate
dos
policy constraint
policy processing
write lock
windows
denial of service
command line
utility
x509_verify_param_add0_policy
x509_verify_param_set1_policies
software

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

46.3%

If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of service when the affected process hangs. Policy processing being enabled on a publicly facing server is not considered to be a common setup. Policy processing is enabled by passing the -policy' argument to the command line utilities or by calling either X509_VERIFY_PARAM_add0_policy()’ or `X509_VERIFY_PARAM_set1_policies()’ functions.

Affected configurations

Vulners
Node
openssl-srcRange3.0.03.0.8
VendorProductVersionCPE
*openssl-src*cpe:2.3:a:*:openssl-src:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

46.3%