<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-2226 Information about the OpenSSL security advisory (CVE-2022-3786 &amp; CVE-2022-3602)</title><link>https://community.appian.com/support/w/kb/2822/kb-2226-information-about-the-openssl-security-advisory-cve-2022-3786-cve-2022-3602</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-2226 Information about the OpenSSL security advisory (CVE-2022-3786 &amp; CVE-2022-3602)</title><link>https://community.appian.com/support/w/kb/2822/kb-2226-information-about-the-openssl-security-advisory-cve-2022-3786-cve-2022-3602</link><pubDate>Wed, 16 Nov 2022 17:12:12 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:56d6d6f9-123b-471b-b22f-393a09f14e5e</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2822/kb-2226-information-about-the-openssl-security-advisory-cve-2022-3786-cve-2022-3602#comments</comments><description>Current Revision posted to Appian Knowledge Base by Elly Meng on 11/16/2022 5:12:12 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 1-Nov-2022 the OpenSSL Project published a &lt;/span&gt;&lt;a href="https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/"&gt;&lt;span style="font-weight:400;"&gt;High Severity security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; to all organizations using OpenSSL 3.0.0 - 3.0.6.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Upon assessing the Appian platform against the details of the CVEs, we can confirm that the Appian platform is not impacted by vulnerabilities described by the OpenSSL security advisory. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Additional Notes&lt;/b&gt;&lt;span style="font-weight:400;"&gt;:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following 2 CVEs were released with additional information on the scope of the vulnerabilities:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3786"&gt;&lt;span style="font-weight:400;"&gt;CVE-2022-3786&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;X.509 Email Address Variable Length Buffer Overflow&amp;rdquo;)&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3602"&gt;&lt;span style="font-weight:400;"&gt;CVE-2022-3602&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;X.509 Email Address 4-byte Buffer Overflow&amp;rdquo;).&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Supporting Documentation:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/"&gt;https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/&lt;/a&gt;&lt;a href="https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/"&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://www.openssl.org/news/secadv/20221101.txt"&gt;https://www.openssl.org/news/secadv/20221101.txt&lt;/a&gt;&lt;a href="https://www.openssl.org/news/secadv/20221101.txt"&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all supported versions of Appian.&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: November 16, 2022&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>KB-2226 Information about the OpenSSL security advisory (CVE-2022-3786 &amp; CVE-2022-3602)</title><link>https://community.appian.com/support/w/kb/2822/kb-2226-information-about-the-openssl-security-advisory-cve-2022-3786-cve-2022-3602/revision/1</link><pubDate>Tue, 01 Nov 2022 21:03:36 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:56d6d6f9-123b-471b-b22f-393a09f14e5e</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2822/kb-2226-information-about-the-openssl-security-advisory-cve-2022-3786-cve-2022-3602#comments</comments><description>Revision 1 posted to Appian Knowledge Base by Elly Meng on 11/1/2022 9:03:36 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 1-Nov-2022 the OpenSSL Project published a &lt;/span&gt;&lt;a href="https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/"&gt;&lt;span style="font-weight:400;"&gt;High Severity security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; to all organizations using OpenSSL 3.0.0 - 3.0.6.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian is currently investigating any usage of OpenSSL and monitoring the release of additional information regarding these vulnerabilities before we publish any details. To date, Appian is not aware of any Appian components that utilize the impacted versions of OpenSSL. We will update this KB should our understanding of the situation change.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Additional Notes&lt;/b&gt;&lt;span style="font-weight:400;"&gt;:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following 2 CVEs were released with additional information on the scope of the vulnerabilities:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3786"&gt;&lt;span style="font-weight:400;"&gt;CVE-2022-3786&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;X.509 Email Address Variable Length Buffer Overflow&amp;rdquo;)&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3602"&gt;&lt;span style="font-weight:400;"&gt;CVE-2022-3602&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;X.509 Email Address 4-byte Buffer Overflow&amp;rdquo;).&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Supporting Documentation:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/"&gt;https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/&lt;/a&gt;&lt;a href="https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/"&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://www.openssl.org/news/secadv/20221101.txt"&gt;https://www.openssl.org/news/secadv/20221101.txt&lt;/a&gt;&lt;a href="https://www.openssl.org/news/secadv/20221101.txt"&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all supported versions of Appian.&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: November 1, 2022&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item></channel></rss>