Vulnerability Name: | CVE-2022-3515 (CCN-239062) | ||||||||||||||||||||||||
Assigned: | 2022-10-17 | ||||||||||||||||||||||||
Published: | 2022-10-17 | ||||||||||||||||||||||||
Updated: | 2023-07-06 | ||||||||||||||||||||||||
Summary: | GnuPG Libksba could allow a remote attacker to execute arbitrary code on the system, caused by an integer overflow in the CRL parser. By sending a specially-crafted data, an attacker could exploit this vulnerability to execute arbitrary code on the system. | ||||||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.5 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-3515 Source: secalert@redhat.com Type: Patch, Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Exploit, Issue Tracking, Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Exploit, Patch, Third Party Advisory secalert@redhat.com Source: XF Type: UNKNOWN gnupg-cve20223515-integer-overflow(239062) Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: GnuPG Web site Integer Overflow in LibKSBA / GnuPG Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: CCN Type: IBM Security Bulletin 6840925 (Watson Discovery) IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in GnuPG [CVE-2022-3515 and CVE-2022-34903] Source: CCN Type: IBM Security Bulletin 6842505 (MQ Operator) IBM MQ Operator and Queue manager container images are vulnerable to multiple vulnerabilities from Expat, SQlite, libxml2, Libksba, zlib and GnuTLS Source: CCN Type: IBM Security Bulletin 6848319 (Voice Gateway) Multiple Vulnerabilities in base image packages affect IBM Voice Gateway Source: CCN Type: IBM Security Bulletin 6853461 (Robotic Process Automation for Cloud Pak) Multiple Security Vulnerabilities may affect IBM Robotic Process Automation for Cloud Pak. Source: CCN Type: IBM Security Bulletin 6890637 (Cloud Pak for Watson AIOps) Multiple Vulnerabilities in CloudPak for Watson AIOPs Source: CCN Type: IBM Security Bulletin 6960595 (Security Verify Bridge) Multiple Security vulnerabilities fixed and shipped with IBM Security Verify Bridge (Docker version) (CVE-2022-2175, CVE-2022-2526, CVE-2022-40674, CVE-2022-3515) Source: CCN Type: IBM Security Bulletin 6981855 (Watson Speech Services Cartridge for Cloud Pak for Data) IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data is vulnerable to arbitrary code execution in GnuPG Libksba [CVE-2022-3515] Source: CCN Type: IBM Security Bulletin 6982841 (Netcool Operations Insight) Netcool Operations Insight v1.6.8 addresses multiple security vulnerabilities. Source: CCN Type: ZDI-22-1463 GnuPG libksba CMS File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability Source: CCN Type: ZDI-22-1464 GnuPG libksba CMS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability Source: CCN Type: ZDI-22-1465 GnuPG libksba CRL File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |