Описание
The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious...
Релиз | Статус | Примечание |
---|---|---|
bionic | not-affected | |
devel | not-affected | |
esm-apps/bionic | not-affected | |
esm-apps/xenial | not-affected | |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | not-affected | |
focal | not-affected | |
groovy | not-affected | |
precise/esm | DNE | |
trusty | ignored | end of standard support |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | not-affected | uses system openssl1.0 |
devel | not-affected | uses system openssl1.1 |
esm-apps/bionic | not-affected | uses system openssl1.0 |
esm-apps/focal | not-affected | uses system openssl1.1 |
esm-apps/xenial | not-affected | uses system openssl |
esm-infra-legacy/trusty | not-affected | uses system openssl |
focal | not-affected | uses system openssl1.1 |
groovy | not-affected | uses system openssl1.1 |
precise/esm | DNE | |
trusty | ignored | end of standard support |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 1.1.1-1ubuntu2.1~18.04.7 |
devel | released | 1.1.1f-1ubuntu5 |
esm-infra-legacy/trusty | not-affected | 1.0.1f-1ubuntu2.27+esm2 |
esm-infra/bionic | not-affected | 1.1.1-1ubuntu2.1~18.04.7 |
esm-infra/focal | not-affected | 1.1.1f-1ubuntu2.1 |
esm-infra/xenial | not-affected | 1.0.2g-1ubuntu4.18 |
focal | released | 1.1.1f-1ubuntu2.1 |
groovy | released | 1.1.1f-1ubuntu4.1 |
precise/esm | not-affected | 1.0.1-4ubuntu5.45 |
trusty | ignored | end of standard support |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 1.0.2n-1ubuntu5.5 |
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/bionic | not-affected | 1.0.2n-1ubuntu5.5 |
esm-infra/focal | DNE | |
focal | DNE | |
groovy | DNE | |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE |
Показывать по
EPSS
4.3 Medium
CVSS2
5.9 Medium
CVSS3
Связанные уязвимости
The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious...
The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious ce
The X.509 GeneralName type is a generic type for representing differen ...
EPSS
4.3 Medium
CVSS2
5.9 Medium
CVSS3