CVE-2022-4203
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
24/02/2023
Last modified:
04/11/2025
Description
A read buffer overrun can be triggered in X.509 certificate verification,<br />
specifically in name constraint checking. Note that this occurs<br />
after certificate chain signature verification and requires either a<br />
CA to have signed the malicious certificate or for the application to<br />
continue certificate verification despite failure to construct a path<br />
to a trusted issuer.<br />
<br />
The read buffer overrun might result in a crash which could lead to<br />
a denial of service attack. In theory it could also result in the disclosure<br />
of private memory contents (such as private keys, or sensitive plaintext)<br />
although we are not aware of any working exploit leading to memory<br />
contents disclosure as of the time of release of this advisory.<br />
<br />
In a TLS client, this can be triggered by connecting to a malicious<br />
server. In a TLS server, this can be triggered if the server requests<br />
client authentication and a malicious client connects.
Impact
Base Score 3.x
4.90
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.0.0 (including) | 3.0.8 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba%3Dcommitdiff%3Bh%3Dc927a3492698c254637da836762f9b1f86cffabc
- https://security.gentoo.org/glsa/202402-08
- https://www.openssl.org/news/secadv/20230207.txt
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba%3Dcommitdiff%3Bh%3Dc927a3492698c254637da836762f9b1f86cffabc
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0003
- https://security.gentoo.org/glsa/202402-08
- https://www.openssl.org/news/secadv/20230207.txt



