OpenSSL-2022
CVE-2022-3602
OpenSSL-2022 | CVE-2022-3602 | |
---|---|---|
21 | 3 | |
531 | 167 | |
0.0% | - | |
10.0 | 10.0 | |
over 1 year ago | over 1 year ago | |
Python | ||
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
OpenSSL-2022
-
OpenSSL CVE Remediation?
NCSC-NL is keeping an up to list of affected software here: https://github.com/NCSC-NL/OpenSSL-2022/tree/main/software. Salesforce is not mentioned but if their servers were using 3.0–3.6 I'd expect them to be upgraded already.
- M365 Defender Vulnerability Management - OpenSSL
- Overview of software (un)affected by the OpenSSL vulnerability
- List of software (un)affected by OpenSSL vulnerability
-
CVE-2022-3786 and CVE-2022-3602: X.509 Email Address Buffer Overflows
NCSC is calling it SpookySSL but I think it is just for funsies. https://github.com/NCSC-NL/OpenSSL-2022
- SSL RCE Vulnerability
- Security issue with OpenSSL
- OpenSSL 3.0.7 - CVE-2022-3602
-
OpenSSL 3.0.7 Published
I'm oversimplifying it a bit, but anything that hasn't reached stable this year is still using v1.1.1 (and therefore unaffected).
Ubuntu v22.04 is vulnerable, but any before it is not. Debian is good (except bookworm which is currently in testing), Fedora (<36) is good, RHEL/CentOS (<9), Arch...
So on top of being not as serious as Heartbleed, servers that are a bit longer in operation (but still well within their support cycle) don't need patching.
https://github.com/NCSC-NL/OpenSSL-2022/tree/main/software
- Urgent: Patch OpenSSL on November 1 to avoid “Critical” Security Vulnerability - GlobalSign
CVE-2022-3602
-
OpenSSL Releases Patch for 2 New High-Severity Vulnerabilities
PoC w/proper technical details: https://github.com/colmmacc/CVE-2022-3602 (no rickroll)
-
OpenSSL 3.0.7 Published
Colm MacCárthaigh has a nice writeup on CVE−2022-3602 including steps to reproduce: https://github.com/colmmacc/CVE-2022-3602
- oggi 2022-11-01 verrà rilasciata una vulnerabilità di livello CRITICAL su OpenSSL 3.0.x
What are some alternatives?
betterscan-ce - Code Scanning/SAST/Static Analysis/Linting using many tools/Scanners + OpenAI GPT with One Report (Code, IaC) - Betterscan Community Edition (CE)
rustls - A modern TLS library in Rust
rustls-ffi - Use Rustls from any language
OpenSSL - TLS/SSL and crypto library
nixpkgs - Nix Packages collection & NixOS
openssl-vuln-nov-2022 - List of software impacted by OpenSSL 3.x Nov 2022 vulnerability
testssl.sh - Testing TLS/SSL encryption anywhere on any port