{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-3786","assignerOrgId":"3a12439a-ef3a-4c79-92e6-6081a721f1e5","assignerShortName":"openssl","datePublished":"2022-11-01T00:00:00.000Z","dateUpdated":"2026-04-14T08:58:03.787Z","dateReserved":"2022-11-01T00:00:00.000Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"OpenSSL","vendor":"OpenSSL","versions":[{"lessThan":"3.0.7","status":"affected","version":"3.0.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Viktor Dukhovni"}],"datePublic":"2022-11-01T00:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.</p>"}],"value":"A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.\n\n"}],"metrics":[{"format":"other","other":{"content":{"text":"HIGH"},"type":"https://www.openssl.org/policies/secpolicy.html#high"}}],"problemTypes":[{"descriptions":[{"description":"Buffer overflow","lang":"en"}]}],"providerMetadata":{"orgId":"3a12439a-ef3a-4c79-92e6-6081a721f1e5","shortName":"openssl","dateUpdated":"2022-11-04T07:28:32.835Z"},"references":[{"name":"OpenSSL Advisory","tags":["vendor-advisory"],"url":"https://www.openssl.org/news/secadv/20221101.txt"},{"name":"3.0.7 git commit","tags":["patch"],"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c42165b5706e42f67ef8ef4c351a9a4c5d21639a"}],"source":{"discovery":"UNKNOWN"},"title":"X.509 Email Address Variable Length Buffer Overflow","x_generator":{"engine":"Vulnogram 0.1.0-dev","importer":"vulnxml2json5.py 2022-11-04 07:19:07.034873"}},"adp":[{"title":"CVE Program Container","references":[{"name":"OpenSSL Advisory","tags":["vendor-advisory","x_transferred"],"url":"https://www.openssl.org/news/secadv/20221101.txt"},{"name":"3.0.7 git commit","tags":["patch","x_transferred"],"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c42165b5706e42f67ef8ef4c351a9a4c5d21639a"},{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00789.html"},{"url":"https://www.kb.cert.org/vuls/id/794340"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-04T19:13:08.687Z"}},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-120","lang":"en","description":"CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.5,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-23T13:26:54.639858Z","id":"CVE-2022-3786","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-05T16:12:38.194Z"}},{"x_adpType":"supplier","providerMetadata":{"orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP","dateUpdated":"2026-04-14T08:58:03.787Z"},"affected":[{"vendor":"Siemens","product":"Calibre ICE","versions":[{"status":"affected","version":"V2022.4","lessThan":"V2023.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Mcenter","versions":[{"status":"affected","version":"V5.2.1","lessThan":"V5.3.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE X204RNA (HSR)","versions":[{"status":"affected","version":"V3.2.7","lessThan":"V3.2.8","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE X204RNA (PRP)","versions":[{"status":"affected","version":"V3.2.7","lessThan":"V3.2.8","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE X204RNA EEC (HSR)","versions":[{"status":"affected","version":"V3.2.7","lessThan":"V3.2.8","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE X204RNA EEC (PRP)","versions":[{"status":"affected","version":"V3.2.7","lessThan":"V3.2.8","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE X204RNA EEC (PRP/HSR)","versions":[{"status":"affected","version":"V3.2.7","lessThan":"V3.2.8","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SICAM GridPass","versions":[{"status":"affected","version":"V1.80","lessThan":"V2.20","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMATIC RTLS Locating Manager","versions":[{"status":"affected","version":"V2.13.0.0","lessThan":"V2.13.0.3","versionType":"custom"}],"defaultStatus":"unknown"}],"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-408105.html"}]}]}}