Nov. 1, 2022, 8:08 p.m. | Jithin Nair

Security Boulevard securityboulevard.com

Background


On 01-Nov-2022, OpenSSL published an advisory about two high-severity security flaws - CVE-2022-3786 (“X.509 Email Address Variable Length Buffer Overflow”) and CVE-2022-3602 (“X.509 Email Address 4-byte Buffer Overflow”). These vulnerabilities affect OpenSSL version 3.0.0 and later and have been addressed in OpenSSL 3.0.7.


What is the issue?


The following vulnerability details were published in the OpenSSL security advisory earlier today:


CVE-2022-3786


A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. This occurs after …

advisory cve cve-2022-3602 cve-2022-3786 openssl openssl vulnerabilities security security advisory vulnerabilities

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Specialist, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

Principal Security Researcher (Advanced Threat Prevention)

@ Palo Alto Networks | Santa Clara, CA, United States

EWT Infosec | IAM Technical Security Consultant - Manager

@ KPMG India | Bengaluru, Karnataka, India

Security Engineering Operations Manager

@ Gusto | San Francisco, CA; Denver, CO; Remote

Network Threat Detection Engineer

@ Meta | Denver, CO | Reston, VA | Menlo Park, CA | Washington, DC