Wir verwenden Cookies, um unsere Webseite zu verbessern. Lesen Sie unsere Cookie-Richtlinie .

AS-2022-009: OpenSSL

2022-08-29

Severity

Moderate

Status

Resolved


Statement

The OpenSSL Software Foundation announced multiple vulnerabilities that have been fixed in the latest release of OpenSSL.

CVE-2022-2068 affected ASUSTOR products with ADM 4.1, ADM 4.0 and ADM 3.5. OpenSSL 1.1.1q has been updated on ADM 4.1.0.RJ72 and ADM 4.0.5.RVI1 to resolve the issue.

CVE-2022-2097 affected AS-20 and AS-30 series of NAS devices with ADM 3.5.

OpenSSL 1.1.1q has been updated on ADM 3.5.9.RWM1 to resolve the issue.


Affected Products

Product Severity Fixed Release Availability
ADM 4.1 Moderate Upgrade to 4.1.0.RJ72 or above.
ADM 4.0 Moderate Upgrade to 4.0.5.RVI1 or above.
ADM 3.5 Moderate Upgrade to 3.5.9.RWM1 or above.

Detail

  • CVE-2022-2068
    • Severity: Moderate
    • In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).
  • CVE-2022-2097
    • Severity: Moderate
    • AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).

Reference


Revision

Revision Date Description
1 2022-07-06 Initial public release.
2 2022-07-07 Release ADM 4.1.0.RJ72 to update OpenSSL version for fixing the issue.
3 2022-07-19 Release ADM 4.0.5.RVI1 to update OpenSSL version for fixing the issue.
4 2022-08-29 Release ADM 3.5.9.RWM1 to update OpenSSL version for fixing the issue.