Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-0286

Опубликовано: 07 фев. 2023
Источник: redhat
CVSS3: 7.4

Описание

There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.

A type confusion vulnerability was found in OpenSSL when OpenSSL X.400 addresses processing inside an X.509 GeneralName. When CRL checking is enabled (for example, the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or cause a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, of which neither needs a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. In this case, this vulnerability is likely only to affect applications that have implemented their own functionality for retrieving CRLs over a network.

Отчет

For shim in Red Hat Enterprise Linux 8 & 9, is not affected as shim doesn't support any CRL processing.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7ovmfWill not fix
Red Hat Enterprise Linux 8shimNot affected
Red Hat Enterprise Linux 9shimNot affected
Red Hat JBoss Web Server 3opensslOut of support scope
JBCS httpd 2.4.51.sp2opensslFixedRHSA-2023:335505.06.2023
JBoss Core Services for RHEL 8jbcs-httpd24-opensslFixedRHSA-2023:335405.06.2023
JBoss Core Services on RHEL 7jbcs-httpd24-opensslFixedRHSA-2023:335405.06.2023
Red Hat Enterprise Linux 6 Extended Lifecycle SupportopensslFixedRHSA-2023:143823.03.2023
Red Hat Enterprise Linux 7opensslFixedRHSA-2023:133520.03.2023
Red Hat Enterprise Linux 7.7 Advanced Update SupportopensslFixedRHSA-2024:513608.08.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-704
https://bugzilla.redhat.com/show_bug.cgi?id=2164440openssl: X.400 address type confusion in X.509 GeneralName

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
ubuntu
больше 2 лет назад

There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect ...

CVSS3: 7.4
nvd
больше 2 лет назад

There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect ap

CVSS3: 7.4
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 7.4
debian
больше 2 лет назад

There is a type confusion vulnerability relating to X.400 address proc ...

suse-cvrf
больше 2 лет назад

Security update for openssl-1_1-livepatches

7.4 High

CVSS3

Уязвимость CVE-2023-0286