๐Ÿ” CVE Alert

CVE-2022-3786

HIGH 7.5

X.509 Email Address Variable Length Buffer Overflow

CVSS Score
7.5
EPSS Score
20.6%
EPSS Percentile
96th

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.

Vendor openssl
Product openssl
Ecosystems
Industries
TechnologySecurity
Published Nov 1, 2022
Last Updated Apr 14, 2026
Stay Ahead of the Next One

Get instant alerts for openssl openssl

Be the first to know when new high vulnerabilities affecting openssl openssl are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

OpenSSL / OpenSSL
3.0.0 < 3.0.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
openssl.org: https://www.openssl.org/news/secadv/20221101.txt git.openssl.org: https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c42165b5706e42f67ef8ef4c351a9a4c5d21639a intel.com: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00789.html kb.cert.org: https://www.kb.cert.org/vuls/id/794340 cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-408105.html

Credits

Viktor Dukhovni