CVE-2022-3996 Vulnerability Details

  /     /     /  

CVE-2022-3996 Metadata Quick Info

CVE Published: 13/12/2022 | CVE Updated: 03/08/2024 | CVE Year: 2022
Source: openssl | Vendor: OpenSSL | Product: OpenSSL
Status : PUBLISHED

CVE-2022-3996 Description

If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of service when the affected process hangs. Policy processing being enabled on a publicly facing server is not considered to be a common setup. Policy processing is enabled by passing the `-policy\' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()\' function. Update (31 March 2023): The description of the policy processing enablement was corrected based on CVE-2023-0466.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-667
CWE Name: CWE-667 Improper Locking
Source: OpenSSL

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).