Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.148376
Categoría:Buffer overflow
Título:OpenSSL: Heap memory corruption with RSA private key operation (CVE-2022-2274) - Linux
Resumen:OpenSSL is prone to a buffer overflow vulnerability in the RSA; implementation for AVX512IFMA capable CPUs.
Descripción:Summary:
OpenSSL is prone to a buffer overflow vulnerability in the RSA
implementation for AVX512IFMA capable CPUs.

Vulnerability Insight:
The OpenSSL 3.0.4 release introduced a serious bug in the RSA
implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA
implementation with 2048 bit private keys incorrect on such machines and memory corruption will
happen during the computation. As a consequence of the memory corruption an attacker may be able
to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or
other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA
instructions of the X86_64 architecture are affected by this issue.

Affected Software/OS:
OpenSSL version 3.0.4.

Solution:
Update to version 3.0.5 or later.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2022-2274
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=4d8a88c134df634ba610ff8db1eb8478ac5fd345
https://github.com/openssl/openssl/issues/18625
CopyrightCopyright (C) 2022 Greenbone Networks GmbH

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.