CVE-2022-1292 The c_rehash script can be exploited to inject commands. It is distributed by some operating systems.

CVE-2022-1292 The c_rehash script can be exploited to inject commands. It is distributed by some operating systems.

An attacker could potentially use the c_rehash script to cause a denial of service (DoS) or perform other actions that are not allowed. An attacker could also use the c_rehash script to execute arbitrary code. Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2zg). Fixed in OpenSSL 1.0.2zc (Affected 1.0.2-1.0.2zf).

An attacker could potentially use the c_rehash script to cause a denial of service (DoS) or perform other actions that are not allowed. An attacker could also use the c_rehash script to execute arbitrary code. c_rehash is used by some upstream distributions to update the OpenSSL package with new features and security fixes. Distributions that automatically execute c_rehash are at risk. If you use the c_rehash script on Debian or Ubuntu, you should upgrade your OpenSSL package. Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zf).

c_rehash is used by

CVE-2021-1290

An attacker could potentially use the x86emu script to cause a denial of service (DoS) or perform other actions that are not allowed. An attacker could also use the x86emu script to execute arbitrary code. Fixed in OpenSSL 1.1.0q (Affected 1.1.0-1.1.0q).

An attacker could potentially use the x86emu script to cause a denial of service (DoS) or perform other actions that are not allowed. Some upstream distributions automatically execute the x86emu script to update the OpenSSL package with new features and security fixes. Distributions that automatically execute the x86emu script are at risk if they do so while they have vulnerabilities in their packages that have not been fixed yet, such as CVE-2021-1290 . If you use the x86emu script on Debian or Ubuntu, you should upgrade your OpenSSL package as soon as possible Fixed in OpenSSL 1.1.0r (Affected 1.1.0-1.1.0q).

Vulnerability Overview

An attacker could potentially use the c_rehash script to cause a denial of service (DoS) or perform other actions that are not allowed. An attacker could also use the c_rehash script to execute arbitrary code.

An attacker could potentially use the c_rehash script to cause a denial of service (DoS) or perform other actions that are not allowed. An attacker could also use the c_rehash script to execute arbitrary code. The OpenSSL package is updated by some upstream distributions with new features and security fixes using the script, which is called c_rehash and is located at /usr/bin/openssl-c-rehash . Distributions that automatically execute c_rehash are at risk. If you use the c_rehash script on Debian or Ubuntu, you should upgrade your OpenSSL package.

Summary

CVE-2022-1292 is a vulnerability found in c_rehash, which is used by some upstream distributions to update the OpenSSL package with new features and security fixes. Distributions that automatically execute c_rehash are at risk. If you use the c_rehash script on Debian or Ubuntu, you should upgrade your OpenSSL package.

How to verify you are running the latest OpenSSL

An attacker could potentially use the c_rehash script to cause a denial of service (DoS) or perform other actions that are not allowed. An attacker could also use the c_rehash script to execute arbitrary code. The OpenSSL security advisory doesn't mention any known exploits in the current release which is the latest version 1.1.1p, but in older releases an attacker can use this vulnerability.

References

Subscribe to CVE.news
Don’t miss out on the latest issues. Sign up now to get access to the library of members-only issues.
jamie@example.com
Subscribe