Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-0778

Summary
Assigner-openssl
Assigner Org ID-3a12439a-ef3a-4c79-92e6-6081a721f1e5
Published At-15 Mar, 2022 | 17:05
Updated At-17 Sep, 2024 | 00:01
Rejected At-
Credits

Infinite loop in BN_mod_sqrt() reachable when parsing certificates

The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:openssl
Assigner Org ID:3a12439a-ef3a-4c79-92e6-6081a721f1e5
Published At:15 Mar, 2022 | 17:05
Updated At:17 Sep, 2024 | 00:01
Rejected At:
▼CVE Numbering Authority (CNA)
Infinite loop in BN_mod_sqrt() reachable when parsing certificates

The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).

Affected Products
Vendor
OpenSSLOpenSSL
Product
OpenSSL
Versions
Affected
  • Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1)
  • Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m)
  • Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc)
Problem Types
TypeCWE IDDescription
textN/AInfinite loop
Type: text
CWE ID: N/A
Description: Infinite loop
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
unknown
url:
https://www.openssl.org/policies/secpolicy.html#High
lang:
eng
value:
High
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Tavis Ormandy (Google)
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.openssl.org/news/secadv/20220315.txt
N/A
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246
N/A
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65
N/A
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83
N/A
https://www.debian.org/security/2022/dsa-5103
vendor-advisory
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
mailing-list
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
mailing-list
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
vendor-advisory
https://www.oracle.com/security-alerts/cpuapr2022.html
N/A
https://security.netapp.com/advisory/ntap-20220321-0002/
N/A
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
N/A
https://www.tenable.com/security/tns-2022-06
N/A
https://www.tenable.com/security/tns-2022-07
N/A
https://www.tenable.com/security/tns-2022-08
N/A
http://seclists.org/fulldisclosure/2022/May/33
mailing-list
http://seclists.org/fulldisclosure/2022/May/35
mailing-list
http://seclists.org/fulldisclosure/2022/May/38
mailing-list
https://www.oracle.com/security-alerts/cpujul2022.html
N/A
https://support.apple.com/kb/HT213257
N/A
https://support.apple.com/kb/HT213256
N/A
https://support.apple.com/kb/HT213255
N/A
https://www.tenable.com/security/tns-2022-09
N/A
https://security.netapp.com/advisory/ntap-20220429-0005/
N/A
http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
N/A
https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
N/A
https://security.gentoo.org/glsa/202210-02
vendor-advisory
https://security.netapp.com/advisory/ntap-20240621-0006/
N/A
Hyperlink: https://www.openssl.org/news/secadv/20220315.txt
Resource: N/A
Hyperlink: https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246
Resource: N/A
Hyperlink: https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65
Resource: N/A
Hyperlink: https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83
Resource: N/A
Hyperlink: https://www.debian.org/security/2022/dsa-5103
Resource:
vendor-advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
Resource:
mailing-list
Hyperlink: https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
Resource:
mailing-list
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
Resource:
vendor-advisory
Hyperlink: https://www.oracle.com/security-alerts/cpuapr2022.html
Resource: N/A
Hyperlink: https://security.netapp.com/advisory/ntap-20220321-0002/
Resource: N/A
Hyperlink: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
Resource: N/A
Hyperlink: https://www.tenable.com/security/tns-2022-06
Resource: N/A
Hyperlink: https://www.tenable.com/security/tns-2022-07
Resource: N/A
Hyperlink: https://www.tenable.com/security/tns-2022-08
Resource: N/A
Hyperlink: http://seclists.org/fulldisclosure/2022/May/33
Resource:
mailing-list
Hyperlink: http://seclists.org/fulldisclosure/2022/May/35
Resource:
mailing-list
Hyperlink: http://seclists.org/fulldisclosure/2022/May/38
Resource:
mailing-list
Hyperlink: https://www.oracle.com/security-alerts/cpujul2022.html
Resource: N/A
Hyperlink: https://support.apple.com/kb/HT213257
Resource: N/A
Hyperlink: https://support.apple.com/kb/HT213256
Resource: N/A
Hyperlink: https://support.apple.com/kb/HT213255
Resource: N/A
Hyperlink: https://www.tenable.com/security/tns-2022-09
Resource: N/A
Hyperlink: https://security.netapp.com/advisory/ntap-20220429-0005/
Resource: N/A
Hyperlink: http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
Resource: N/A
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
Resource: N/A
Hyperlink: https://security.gentoo.org/glsa/202210-02
Resource:
vendor-advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20240621-0006/
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.openssl.org/news/secadv/20220315.txt
x_transferred
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246
x_transferred
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65
x_transferred
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83
x_transferred
https://www.debian.org/security/2022/dsa-5103
vendor-advisory
x_transferred
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
mailing-list
x_transferred
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
mailing-list
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
vendor-advisory
x_transferred
https://www.oracle.com/security-alerts/cpuapr2022.html
x_transferred
https://security.netapp.com/advisory/ntap-20220321-0002/
x_transferred
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
x_transferred
https://www.tenable.com/security/tns-2022-06
x_transferred
https://www.tenable.com/security/tns-2022-07
x_transferred
https://www.tenable.com/security/tns-2022-08
x_transferred
http://seclists.org/fulldisclosure/2022/May/33
mailing-list
x_transferred
http://seclists.org/fulldisclosure/2022/May/35
mailing-list
x_transferred
http://seclists.org/fulldisclosure/2022/May/38
mailing-list
x_transferred
https://www.oracle.com/security-alerts/cpujul2022.html
x_transferred
https://support.apple.com/kb/HT213257
x_transferred
https://support.apple.com/kb/HT213256
x_transferred
https://support.apple.com/kb/HT213255
x_transferred
https://www.tenable.com/security/tns-2022-09
x_transferred
https://security.netapp.com/advisory/ntap-20220429-0005/
x_transferred
http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
x_transferred
https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
x_transferred
https://security.gentoo.org/glsa/202210-02
vendor-advisory
x_transferred
https://security.netapp.com/advisory/ntap-20240621-0006/
x_transferred
Hyperlink: https://www.openssl.org/news/secadv/20220315.txt
Resource:
x_transferred
Hyperlink: https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246
Resource:
x_transferred
Hyperlink: https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65
Resource:
x_transferred
Hyperlink: https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83
Resource:
x_transferred
Hyperlink: https://www.debian.org/security/2022/dsa-5103
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
Resource:
mailing-list
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
Resource:
mailing-list
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://www.oracle.com/security-alerts/cpuapr2022.html
Resource:
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20220321-0002/
Resource:
x_transferred
Hyperlink: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
Resource:
x_transferred
Hyperlink: https://www.tenable.com/security/tns-2022-06
Resource:
x_transferred
Hyperlink: https://www.tenable.com/security/tns-2022-07
Resource:
x_transferred
Hyperlink: https://www.tenable.com/security/tns-2022-08
Resource:
x_transferred
Hyperlink: http://seclists.org/fulldisclosure/2022/May/33
Resource:
mailing-list
x_transferred
Hyperlink: http://seclists.org/fulldisclosure/2022/May/35
Resource:
mailing-list
x_transferred
Hyperlink: http://seclists.org/fulldisclosure/2022/May/38
Resource:
mailing-list
x_transferred
Hyperlink: https://www.oracle.com/security-alerts/cpujul2022.html
Resource:
x_transferred
Hyperlink: https://support.apple.com/kb/HT213257
Resource:
x_transferred
Hyperlink: https://support.apple.com/kb/HT213256
Resource:
x_transferred
Hyperlink: https://support.apple.com/kb/HT213255
Resource:
x_transferred
Hyperlink: https://www.tenable.com/security/tns-2022-09
Resource:
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20220429-0005/
Resource:
x_transferred
Hyperlink: http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
Resource:
x_transferred
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
Resource:
x_transferred
Hyperlink: https://security.gentoo.org/glsa/202210-02
Resource:
vendor-advisory
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20240621-0006/
Resource:
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:openssl-security@openssl.org
Published At:15 Mar, 2022 | 17:15
Updated At:21 Jun, 2024 | 19:15

The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

OpenSSL
openssl
>>openssl>>Versions from 1.0.2(inclusive) to 1.0.2zd(exclusive)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>Versions from 1.1.0(inclusive) to 1.1.1n(exclusive)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>Versions from 3.0.0(inclusive) to 3.0.2(exclusive)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>9.0
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>10.0
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>11.0
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>cloud_volumes_ontap_mediator>>-
cpe:2.3:a:netapp:cloud_volumes_ontap_mediator:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>clustered_data_ontap>>-
cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>clustered_data_ontap_antivirus_connector>>-
cpe:2.3:a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>santricity_smi-s_provider>>-
cpe:2.3:a:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>storagegrid>>-
cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>a250_firmware>>-
cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>a250>>-
cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>500f_firmware>>-
cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>500f>>-
cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>34
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>36
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>Versions before 8.15.4(exclusive)
cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>Versions from 10.0.0(inclusive) to 10.1.2(exclusive)
cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*
MariaDB Foundation
mariadb
>>mariadb>>Versions from 10.2.0(inclusive) to 10.2.42(exclusive)
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
MariaDB Foundation
mariadb
>>mariadb>>Versions from 10.3.0(inclusive) to 10.3.33(exclusive)
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
MariaDB Foundation
mariadb
>>mariadb>>Versions from 10.4.0(inclusive) to 10.4.23(exclusive)
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
MariaDB Foundation
mariadb
>>mariadb>>Versions from 10.5.0(inclusive) to 10.5.14(exclusive)
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
MariaDB Foundation
mariadb
>>mariadb>>Versions from 10.6.0(inclusive) to 10.6.6(exclusive)
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
MariaDB Foundation
mariadb
>>mariadb>>Versions from 10.7.0(inclusive) to 10.7.2(exclusive)
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
Node.js (OpenJS Foundation)
nodejs
>>node.js>>Versions from 12.0.0(inclusive) to 12.12.0(inclusive)
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
Node.js (OpenJS Foundation)
nodejs
>>node.js>>Versions from 12.13.0(inclusive) to 12.22.11(exclusive)
cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
Node.js (OpenJS Foundation)
nodejs
>>node.js>>Versions between 14.0.0(exclusive) and 14.14.0(inclusive)
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
Node.js (OpenJS Foundation)
nodejs
>>node.js>>Versions from 14.15.0(inclusive) to 14.19.1(exclusive)
cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
Node.js (OpenJS Foundation)
nodejs
>>node.js>>Versions between 16.0.0(exclusive) and 16.12.0(inclusive)
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
Node.js (OpenJS Foundation)
nodejs
>>node.js>>Versions from 16.13.0(inclusive) to 16.14.2(exclusive)
cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
Node.js (OpenJS Foundation)
nodejs
>>node.js>>Versions between 17.0.0(exclusive) and 17.7.2(exclusive)
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
Weaknesses
CWE IDTypeSource
CWE-835Primarynvd@nist.gov
CWE ID: CWE-835
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.htmlopenssl-security@openssl.org
Third Party Advisory
VDB Entry
http://seclists.org/fulldisclosure/2022/May/33openssl-security@openssl.org
Mailing List
Third Party Advisory
http://seclists.org/fulldisclosure/2022/May/35openssl-security@openssl.org
Mailing List
Third Party Advisory
http://seclists.org/fulldisclosure/2022/May/38openssl-security@openssl.org
Mailing List
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdfopenssl-security@openssl.org
Third Party Advisory
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65openssl-security@openssl.org
N/A
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83openssl-security@openssl.org
N/A
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246openssl-security@openssl.org
N/A
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.htmlopenssl-security@openssl.org
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.htmlopenssl-security@openssl.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/openssl-security@openssl.org
N/A
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/openssl-security@openssl.org
N/A
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/openssl-security@openssl.org
N/A
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002openssl-security@openssl.org
Third Party Advisory
https://security.gentoo.org/glsa/202210-02openssl-security@openssl.org
Third Party Advisory
https://security.netapp.com/advisory/ntap-20220321-0002/openssl-security@openssl.org
Third Party Advisory
https://security.netapp.com/advisory/ntap-20220429-0005/openssl-security@openssl.org
Third Party Advisory
https://security.netapp.com/advisory/ntap-20240621-0006/openssl-security@openssl.org
N/A
https://support.apple.com/kb/HT213255openssl-security@openssl.org
Third Party Advisory
https://support.apple.com/kb/HT213256openssl-security@openssl.org
Third Party Advisory
https://support.apple.com/kb/HT213257openssl-security@openssl.org
Third Party Advisory
https://www.debian.org/security/2022/dsa-5103openssl-security@openssl.org
Third Party Advisory
https://www.openssl.org/news/secadv/20220315.txtopenssl-security@openssl.org
Vendor Advisory
https://www.oracle.com/security-alerts/cpuapr2022.htmlopenssl-security@openssl.org
Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2022.htmlopenssl-security@openssl.org
Third Party Advisory
https://www.tenable.com/security/tns-2022-06openssl-security@openssl.org
Third Party Advisory
https://www.tenable.com/security/tns-2022-07openssl-security@openssl.org
Third Party Advisory
https://www.tenable.com/security/tns-2022-08openssl-security@openssl.org
Third Party Advisory
https://www.tenable.com/security/tns-2022-09openssl-security@openssl.org
Third Party Advisory
Hyperlink: http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
Source: openssl-security@openssl.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://seclists.org/fulldisclosure/2022/May/33
Source: openssl-security@openssl.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://seclists.org/fulldisclosure/2022/May/35
Source: openssl-security@openssl.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://seclists.org/fulldisclosure/2022/May/38
Source: openssl-security@openssl.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
Source: openssl-security@openssl.org
Resource:
Third Party Advisory
Hyperlink: https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65
Source: openssl-security@openssl.org
Resource: N/A
Hyperlink: https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83
Source: openssl-security@openssl.org
Resource: N/A
Hyperlink: https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246
Source: openssl-security@openssl.org
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
Source: openssl-security@openssl.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
Source: openssl-security@openssl.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
Source: openssl-security@openssl.org
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
Source: openssl-security@openssl.org
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
Source: openssl-security@openssl.org
Resource: N/A
Hyperlink: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
Source: openssl-security@openssl.org
Resource:
Third Party Advisory
Hyperlink: https://security.gentoo.org/glsa/202210-02
Source: openssl-security@openssl.org
Resource:
Third Party Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20220321-0002/
Source: openssl-security@openssl.org
Resource:
Third Party Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20220429-0005/
Source: openssl-security@openssl.org
Resource:
Third Party Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20240621-0006/
Source: openssl-security@openssl.org
Resource: N/A
Hyperlink: https://support.apple.com/kb/HT213255
Source: openssl-security@openssl.org
Resource:
Third Party Advisory
Hyperlink: https://support.apple.com/kb/HT213256
Source: openssl-security@openssl.org
Resource:
Third Party Advisory
Hyperlink: https://support.apple.com/kb/HT213257
Source: openssl-security@openssl.org
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2022/dsa-5103
Source: openssl-security@openssl.org
Resource:
Third Party Advisory
Hyperlink: https://www.openssl.org/news/secadv/20220315.txt
Source: openssl-security@openssl.org
Resource:
Vendor Advisory
Hyperlink: https://www.oracle.com/security-alerts/cpuapr2022.html
Source: openssl-security@openssl.org
Resource:
Third Party Advisory
Hyperlink: https://www.oracle.com/security-alerts/cpujul2022.html
Source: openssl-security@openssl.org
Resource:
Third Party Advisory
Hyperlink: https://www.tenable.com/security/tns-2022-06
Source: openssl-security@openssl.org
Resource:
Third Party Advisory
Hyperlink: https://www.tenable.com/security/tns-2022-07
Source: openssl-security@openssl.org
Resource:
Third Party Advisory
Hyperlink: https://www.tenable.com/security/tns-2022-08
Source: openssl-security@openssl.org
Resource:
Third Party Advisory
Hyperlink: https://www.tenable.com/security/tns-2022-09
Source: openssl-security@openssl.org
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found