{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-3996","assignerOrgId":"3a12439a-ef3a-4c79-92e6-6081a721f1e5","state":"PUBLISHED","assignerShortName":"openssl","requesterUserId":"b0d835d1-bcd6-467d-a017-37d7df925f4b","dateReserved":"2022-11-15T11:47:05.740Z","datePublished":"2022-12-13T15:43:06.821Z","dateUpdated":"2024-08-03T01:27:54.475Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"OpenSSL","vendor":"OpenSSL","versions":[{"lessThanOrEqual":"3.0.7","status":"affected","version":"3.0.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Polar Bear"},{"lang":"en","type":"remediation developer","user":"00000000-0000-4000-9000-000000000000","value":"Paul Dale"}],"datePublic":"2022-12-13T07:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"If an X.509 certificate contains a malformed policy constraint and<br>policy processing is enabled, then a write lock will be taken twice<br>recursively.  On some operating systems (most widely: Windows) this<br>results in a denial of service when the affected process hangs.  Policy<br>processing being enabled on a publicly facing server is not considered<br>to be a common setup.<br><br>Policy processing is enabled by passing the `-policy'<br>argument to the command line utilities or by calling the<br>`X509_VERIFY_PARAM_set1_policies()' function.<br><br>Update (31 March 2023): The description of the policy processing enablement<br>was corrected based on CVE-2023-0466."}],"value":"If an X.509 certificate contains a malformed policy constraint and\npolicy processing is enabled, then a write lock will be taken twice\nrecursively.  On some operating systems (most widely: Windows) this\nresults in a denial of service when the affected process hangs.  Policy\nprocessing being enabled on a publicly facing server is not considered\nto be a common setup.\n\nPolicy processing is enabled by passing the `-policy'\nargument to the command line utilities or by calling the\n`X509_VERIFY_PARAM_set1_policies()' function.\n\nUpdate (31 March 2023): The description of the policy processing enablement\nwas corrected based on CVE-2023-0466."}],"metrics":[{"format":"other","other":{"content":{"text":"Low"},"type":"https://www.openssl.org/policies/secpolicy.html#low"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-667","description":"CWE-667 Improper Locking","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"3a12439a-ef3a-4c79-92e6-6081a721f1e5","shortName":"openssl","dateUpdated":"2023-03-31T09:50:45.685Z"},"references":[{"name":"OpenSSL Advisory","tags":["vendor-advisory"],"url":"https://www.openssl.org/news/secadv/20221213.txt"},{"tags":["patch"],"url":"https://github.com/openssl/openssl/commit/7725e7bfe6f2ce8146b6552b44e0d226be7638e7"}],"source":{"discovery":"UNKNOWN"},"title":"X.509 Policy Constraints Double Locking","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://security.netapp.com/advisory/ntap-20230203-0003/"},{"name":"OpenSSL Advisory","tags":["vendor-advisory","x_transferred"],"url":"https://www.openssl.org/news/secadv/20221213.txt"},{"tags":["patch","x_transferred"],"url":"https://github.com/openssl/openssl/commit/7725e7bfe6f2ce8146b6552b44e0d226be7638e7"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:27:54.475Z"}},{"affected":[{"vendor":"openssl","product":"openssl","cpes":["cpe:2.3:a:openssl:openssl:3.0.0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"3.0.0","status":"affected","lessThan":"3.0.7","versionType":"custom"}]},{"vendor":"netapp","product":"ontap_9","cpes":["cpe:2.3:a:netapp:ontap_9:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"*","versionType":"custom"}]},{"vendor":"netapp","product":"fas\\/aff_baseboard_management_controller","cpes":["cpe:2.3:a:netapp:fas\\/aff_baseboard_management_controller:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"*","versionType":"custom"}]},{"vendor":"netapp","product":"management_services_for_element_software","cpes":["cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"*","versionType":"custom"}]},{"vendor":"netapp","product":"altavault_ost_plug-in","cpes":["cpe:2.3:a:netapp:altavault_ost_plug-in:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"*","versionType":"custom"}]},{"vendor":"netapp","product":"hci_baseboard_management_controller","cpes":["cpe:2.3:a:netapp:hci_baseboard_management_controller:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"*","versionType":"custom"}]},{"vendor":"netapp","product":"smi-s_provider","cpes":["cpe:2.3:a:netapp:smi-s_provider:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"*","versionType":"custom"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.5,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-08-01T21:11:25.058550Z","id":"CVE-2022-3996","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-01T21:18:41.599Z"}}]}}