Security News > 2022 > July > OpenSSL Releases Patch for High-Severity Bug that Could Lead to RCE Attacks

OpenSSL Releases Patch for High-Severity Bug that Could Lead to RCE Attacks
2022-07-06 06:38

The maintainers of the OpenSSL project have released patches to address a high-severity bug in the cryptographic library that could potentially lead to remote code execution under certain scenarios.

The issue, now assigned the identifier CVE-2022-2274, has been described as a case of heap memory corruption with RSA private key operation that was introduced in OpenSSL version 3.0.4 released on June 21, 2022.

First released in 1998, OpenSSL is a general-purpose cryptography library that offers open-source implementation of the Secure Sockets Layer and Transport Layer Security protocols, enabling users to generate private keys, create certificate signing requests, install SSL/TLS certificates.

Calling it a "Serious bug in the RSA implementation," the maintainers said the flaw could lead to memory corruption during computation that could be weaponized by an attacker to trigger remote code execution on the machine performing the computation.

Xi Ruoyao, a Ph.D. student at Xidian University, has been credited with reporting the flaw to OpenSSL on June 22, 2022.

Users of the library are recommended to upgrade to OpenSSL version 3.0.5 to mitigate any potential threats.


News URL

https://thehackernews.com/2022/07/openssl-releases-patch-for-high.html

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2022-07-01 CVE-2022-2274 Out-of-bounds Write vulnerability in multiple products
The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions.
network
low complexity
openssl netapp CWE-787
critical
9.8

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Openssl 2 12 97 52 17 178