445
VMScore

CVE-2022-29242

Published: 24/05/2022 Updated: 07/06/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

GOST engine is a reference implementation of the Russian GOST crypto algorithms for OpenSSL. TLS clients using GOST engine when ciphersuite `TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC` is agreed and the server uses 512 bit GOST secret keys are vulnerable to buffer overflow. GOST engine version 3.0.1 contains a patch for this issue. Disabling ciphersuite `TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC` is a possible workaround.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gost engine project gost engine

Vendor Advisories

Debian Bug report logs - #1012512 libengine-gost-openssl11: CVE-2022-29242 Package: src:libengine-gost-openssl11; Maintainer for src:libengine-gost-openssl11 is Wartan Hachaturow <wart@debianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Wed, 8 Jun 2022 15:51:01 UTC Severity: grave Tags: security, ...