CVE-2022-3996

CVSS V2 None CVSS V3 None
Description
If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of service when the affected process hangs. Policy processing being enabled on a publicly facing server is not considered to be a common setup. Policy processing is enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function. Update (31 March 2023): The description of the policy processing enablement was corrected based on CVE-2023-0466.
Overview
  • CVE ID
  • CVE-2022-3996
  • Assigner
  • openssl-security@openssl.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2022-12-13T16:15:22
  • Last Modified Date
  • 2023-03-31T10:15:06
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 1 OR 3.0.0 3.0.7
History
Created Old Value New Value Data Type Notes
2022-12-13 16:18:29 Added to TrackCVE
2022-12-13 17:21:49 2022-12-13T16:15:22.007 2022-12-13T16:15:22 CVE Published Date updated
2022-12-13 17:21:49 2022-12-13T16:52:09 CVE Modified Date updated
2022-12-13 17:21:49 Received Awaiting Analysis Vulnerability Status updated
2022-12-15 16:18:04 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2022-12-15 18:16:50 2022-12-15T17:46:30 CVE Modified Date updated
2022-12-15 18:16:50 Undergoing Analysis Analyzed Vulnerability Status updated
2022-12-15 18:16:50 CWE-667 Weakness Enumeration new
2022-12-15 18:16:50 CPE Information updated
2023-03-31 12:14:09 2023-03-31T10:15:06 CVE Modified Date updated
2023-03-31 12:14:09 Analyzed Modified Vulnerability Status updated
2023-03-31 12:14:10 If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of service when the affected process hangs. Policy processing being enabled on a publicly facing server is not considered to be a common setup. Policy processing is enabled by passing the `-policy' argument to the command line utilities or by calling either `X509_VERIFY_PARAM_add0_policy()' or `X509_VERIFY_PARAM_set1_policies()' functions. If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of service when the affected process hangs. Policy processing being enabled on a publicly facing server is not considered to be a common setup. Policy processing is enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function. Update (31 March 2023): The description of the policy processing enablement was corrected based on CVE-2023-0466. Description updated