Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-0465

Опубликовано: 28 мар. 2023
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the -policy' argument to the command line utilities or by calling the X509_VERIFY_PARAM_set1_policies()' function.

A flaw was found in OpenSSL. Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. OpenSSL and other certificate policy checks silently ignore invalid certificate policies in leaf certificates that are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the -policy' argument to the command line utilities or by calling the X509_VERIFY_PARAM_set1_policies()' function.

Отчет

Red Hat has determined that this flaw is of low impact because it only affects applications that use a non-default configuration (enabling policy processing), requires a malicious CA, and does not compromise cryptographic integrity or directly enable system exploitation.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6opensslOut of support scope
Red Hat Enterprise Linux 7opensslOut of support scope
Red Hat Enterprise Linux 7ovmfOut of support scope
Red Hat Enterprise Linux 8compat-openssl10Will not fix
Red Hat Enterprise Linux 8edk2Not affected
Red Hat Enterprise Linux 8opensslFix deferred
Red Hat Enterprise Linux 8shimFix deferred
Red Hat Enterprise Linux 9compat-openssl11Will not fix
Red Hat Enterprise Linux 9edk2Not affected
Red Hat Enterprise Linux 9shimFix deferred

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=2182561openssl: Invalid certificate policies in leaf certificates are silently ignored

EPSS

Процентиль: 61%
0.00421
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 2 лет назад

Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 5.3
nvd
около 2 лет назад

Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 5.3
msrc
около 2 лет назад

Описание отсутствует

CVSS3: 5.3
debian
около 2 лет назад

Applications that use a non-default option when verifying certificates ...

suse-cvrf
около 2 лет назад

Security update for openssl

EPSS

Процентиль: 61%
0.00421
Низкий

5.3 Medium

CVSS3