CVE-2022-2068 - log back

CVE-2022-2068 edited at 21 Jun 2022 17:25:41
Type
- Denial of service
+ Arbitrary command execution
CVE-2022-2068 created at 21 Jun 2022 17:25:13
Severity
+ Medium
Remote
+ Local
Type
+ Denial of service
Description
+ In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool.
References
+ https://www.openssl.org/news/secadv/20220621.txt
+ https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa
+ https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7
Notes