CVE-2022-3515

Source
https://cve.org/CVERecord?id=CVE-2022-3515
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-3515.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-3515
Downstream
Related
Published
2023-01-12T15:15:10.187Z
Modified
2026-02-16T07:48:47.068051Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.

References

Affected packages

Git / git.gnupg.org/gpg4win.git

Affected versions

gpg4win-2.*
gpg4win-2.0.0
gpg4win-2.0.1
gpg4win-2.0.2rc2
gpg4win-2.1.0
gpg4win-2.1.0-beta1
gpg4win-2.1.0-rc1
gpg4win-2.1.0-rc2
gpg4win-2.1.1
gpg4win-2.1.1-34299-beta
gpg4win-2.2.0
gpg4win-2.2.1
gpg4win-2.2.2
gpg4win-2.2.3
gpg4win-2.2.4
gpg4win-2.2.5
gpg4win-2.2.6
gpg4win-2.3.0
gpg4win-2.3.1
gpg4win-3.*
gpg4win-3.0.0
gpg4win-3.0.1
gpg4win-3.0.2
gpg4win-3.0.3
gpg4win-3.1.0
gpg4win-3.1.1
gpg4win-3.1.10
gpg4win-3.1.11
gpg4win-3.1.12
gpg4win-3.1.13
gpg4win-3.1.14
gpg4win-3.1.15
gpg4win-3.1.16
gpg4win-3.1.17
gpg4win-3.1.18
gpg4win-3.1.19
gpg4win-3.1.2
gpg4win-3.1.20
gpg4win-3.1.21
gpg4win-3.1.22
gpg4win-3.1.23
gpg4win-3.1.24
gpg4win-3.1.25
gpg4win-3.1.3
gpg4win-3.1.4
gpg4win-3.1.5
gpg4win-3.1.6
gpg4win-3.1.7
gpg4win-3.1.8
gpg4win-3.1.9
gpg4win-4.*
gpg4win-4.0-base
gpg4win-4.0.0
gpg4win-4.0.1
gpg4win-4.0.2
gpg4win-4.0.3
gpg4win-4.0.4
gpg4win-compendium-de-3.*
gpg4win-compendium-de-3.0.0
gpg4win-compendium-de-3.0.0-beta3
gpg4win-compendium-de-3.0.0-beta4
gpg4win-compendium-en-3.*
gpg4win-compendium-en-3.0.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-3515.json"