CVE-2022-3602

HIGH

Openssl < 3.0.7 - Out-of-Bounds Write

Title source: rule

Description

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).

Exploits (8)

nomisec WRITEUP 532 stars
by NCSC-NL · poc
https://github.com/NCSC-NL/OpenSSL-2022
nomisec WRITEUP 170 stars
by colmmacc · poc
https://github.com/colmmacc/CVE-2022-3602
nomisec WORKING POC 17 stars
by rbowes-r7 · poc
https://github.com/rbowes-r7/cve-2022-3602-and-cve-2022-3786-openssl-poc
nomisec WORKING POC 12 stars
by eatscrayon · poc
https://github.com/eatscrayon/CVE-2022-3602-poc
nomisec SCANNER 4 stars
by corelight · poc
https://github.com/corelight/CVE-2022-3602
nomisec SCANNER 4 stars
by cybersecurityworks553 · poc
https://github.com/cybersecurityworks553/CVE-2022-3602-and-CVE-2022-3786
nomisec WORKING POC 3 stars
by attilaszia · poc
https://github.com/attilaszia/cve-2022-3602
nomisec SCANNER 1 stars
by alicangnll · poc
https://github.com/alicangnll/SpookySSL-Scanner

References (42)

... and 22 more

Scores

CVSS v3 7.5
EPSS 0.8322
EPSS Percentile 99.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-787
Status published
Products (11)
crates.io/openssl-src 300.0.0 - 300.0.11crates.io
fedoraproject/fedora 36
fedoraproject/fedora 37
fedoraproject/fedora 26
fedoraproject/fedora 27
netapp/clustered_data_ontap
nodejs/node.js 18.12.0
nodejs/node.js 19.0.0
nodejs/node.js 18.0.0 - 18.11.0
openssl/openssl 3.0.0 - 3.0.7
... and 1 more
Published Nov 01, 2022
Tracked Since Feb 18, 2026