REDLEGG BLOG

Emergency Vulnerability Bulletin - 11/01/22

11/1/22 5:27 PM  |  by RedLegg Blog

X.509 Email Address 4-Byte Buffer Overflow Vulnerability

Identifier: CVE-2022-3602

Exploit or POC: No

Update: https://www.openssl.org/news/secadv/20221101.txt

Description: CVE-2022-3602 is a buffer overflow vulnerability that could potentially elicit remote code execution or denial of service. A successful exploit can be initiated in the X.509 certificate verification. This vulnerability allows an attacker to send a specially crafted malicious email address to overflow four attacker-controlled bytes on the stack.

Mitigation recommendation: Patching is currently the only method of mitigation

RedLegg Action: None at this time.

X.509 Email Address Variable Length Buffer Overflow Vulnerability

Identifier: CVE-2022-3786

Exploit or POC: No

Update: https://www.openssl.org/news/secadv/20221101.txt

Description: CVE-2022-3786 is a buffer overflow vulnerability that could potentially elicit a denial of service. A successful exploit can be initiated in the X.509 certificate verification. This vulnerability allows an attacker to send a specially crafted malicious email address in a certificate to overflow an arbitrary number of bytes containing the ‘.’ character (decimal 46) on the stack.

Mitigation recommendation: Patching is currently the only method of mitigation

RedLegg Action: None at this time.

 

Get Blog Updates

Related Articles

Threat Intel: ATP27, FRP, TTNG, and More… threat intel, CTI Report

Threat Intel: ATP27, FRP, TTNG, and More…

EXECUTIVE SUMMARY THREAT INTELLIGENCE AT REDLEGG This report serves as a comprehensive resource, offering insights into ...
Summoning Cyber Awareness: Exorcising the Malevolent Realm of Remote Monitoring and Management Tools threat intel, 96bravo

Summoning Cyber Awareness: Exorcising the Malevolent Realm of Remote Monitoring and Management Tools

EXECUTIVE SUMMARY RedLegg would like to recognize the efforts instituted by the Cybersecurity & Infrastructure ...
Critical Security Vulnerabilities Bulletin