Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2022-4450 | First vendor Publication | 2023-02-08 |
Vendor | Cve | Last vendor Modification | 2025-02-13 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | |||
---|---|---|---|
Overall CVSS Score | 7.5 | ||
Base Score | 7.5 | Environmental Score | 7.5 |
impact SubScore | 3.6 | Temporal Score | 7.5 |
Exploitabality Sub Score | 3.9 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | None |
Integrity Impact | None | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-415 | Double Free |
CPE : Common Platform Enumeration
Sources (Detail)
Alert History
Date | Informations |
---|---|
2025-03-29 03:12:08 |
|
2025-03-28 13:33:19 |
|
2025-02-13 21:22:00 |
|
2024-11-28 14:17:08 |
|
2024-08-21 02:34:46 |
|
2024-08-02 13:42:26 |
|
2024-08-02 01:30:59 |
|
2024-03-01 13:28:08 |
|
2024-02-04 13:28:04 |
|
2024-02-02 02:40:08 |
|
2024-02-01 12:28:19 |
|
2023-11-07 21:30:16 |
|
2023-09-05 13:35:28 |
|
2023-09-05 01:27:43 |
|
2023-09-02 13:33:08 |
|
2023-09-02 01:28:08 |
|
2023-08-12 13:39:58 |
|
2023-08-12 01:27:26 |
|
2023-08-11 13:30:48 |
|
2023-08-11 01:28:17 |
|
2023-08-09 02:18:31 |
|
2023-08-06 13:28:21 |
|
2023-08-06 01:27:07 |
|
2023-08-04 13:28:48 |
|
2023-08-04 01:27:29 |
|
2023-07-19 13:19:14 |
|
2023-07-19 09:27:30 |
|
2023-07-14 13:28:46 |
|
2023-07-14 01:27:11 |
|
2023-03-29 02:28:48 |
|
2023-03-28 12:27:16 |
|
2023-02-24 21:27:25 |
|
2023-02-19 00:27:19 |
|
2023-02-09 17:27:17 |
|
2023-02-09 00:27:16 |
|