Executive Summary

Informations
Name CVE-2022-4450 First vendor Publication 2023-02-08
Vendor Cve Last vendor Modification 2024-02-04

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 7.5
Base Score 7.5 Environmental Score 7.5
impact SubScore 3.6 Temporal Score 7.5
Exploitabality Sub Score 3.9
 
Attack Vector Network Attack Complexity Low
Privileges Required None User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack.

The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected.

These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0.

The OpenSSL asn1parse command line application is also impacted by this issue.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-415 Double Free

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 424
Application 4

Sources (Detail)

https://security.gentoo.org/glsa/202402-08
Source Url
MISC https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=63bcf189be73a9cc...
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bbcf509bd046b34c...
https://www.openssl.org/news/secadv/20230207.txt

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
Date Informations
2024-03-01 13:28:08
  • Multiple Updates
2024-02-04 13:28:04
  • Multiple Updates
2024-02-02 02:40:08
  • Multiple Updates
2024-02-01 12:28:19
  • Multiple Updates
2023-11-07 21:30:16
  • Multiple Updates
2023-09-05 13:35:28
  • Multiple Updates
2023-09-05 01:27:43
  • Multiple Updates
2023-09-02 13:33:08
  • Multiple Updates
2023-09-02 01:28:08
  • Multiple Updates
2023-08-12 13:39:58
  • Multiple Updates
2023-08-12 01:27:26
  • Multiple Updates
2023-08-11 13:30:48
  • Multiple Updates
2023-08-11 01:28:17
  • Multiple Updates
2023-08-09 02:18:31
  • Multiple Updates
2023-08-06 13:28:21
  • Multiple Updates
2023-08-06 01:27:07
  • Multiple Updates
2023-08-04 13:28:48
  • Multiple Updates
2023-08-04 01:27:29
  • Multiple Updates
2023-07-19 13:19:14
  • Multiple Updates
2023-07-19 09:27:30
  • Multiple Updates
2023-07-14 13:28:46
  • Multiple Updates
2023-07-14 01:27:11
  • Multiple Updates
2023-03-29 02:28:48
  • Multiple Updates
2023-03-28 12:27:16
  • Multiple Updates
2023-02-24 21:27:25
  • Multiple Updates
2023-02-19 00:27:19
  • Multiple Updates
2023-02-09 17:27:17
  • Multiple Updates
2023-02-09 00:27:16
  • First insertion