Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-0464

Опубликовано: 22 мар. 2023
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS3: 7.5

Описание

A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the -policy' argument to the command line utilities or by calling the X509_VERIFY_PARAM_set1_policies()' function.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

2023.11-5
esm-apps/bionic

needs-triage

esm-apps/xenial

needs-triage

esm-infra/focal

needed

focal

ignored

end of standard support, was needed
jammy

needed

kinetic

ignored

end of life, was needs-triage
lunar

ignored

end of life, was needs-triage
mantic

ignored

end of life, was needed

Показывать по

РелизСтатусПримечание
bionic

not-affected

uses system openssl1.0
devel

not-affected

uses system openssl
esm-apps/bionic

not-affected

uses system openssl1.0
esm-apps/focal

not-affected

uses system openssl
esm-apps/jammy

needed

esm-apps/noble

not-affected

uses system openssl
esm-apps/xenial

not-affected

uses system openssl
esm-infra-legacy/trusty

not-affected

uses system openssl
focal

not-affected

uses system openssl
jammy

needed

Показывать по

РелизСтатусПримечание
bionic

released

1.1.1-1ubuntu2.1~18.04.22
devel

released

3.0.8-1ubuntu2
esm-infra-legacy/trusty

not-affected

1.0.1f-1ubuntu2.27+esm7
esm-infra/bionic

not-affected

1.1.1-1ubuntu2.1~18.04.22
esm-infra/focal

not-affected

1.1.1f-1ubuntu2.18
esm-infra/xenial

released

1.0.2g-1ubuntu4.20+esm7
fips-preview/jammy

released

3.0.2-0ubuntu1.9+Fips1
fips-updates/bionic

released

1.1.1-1ubuntu2.fips.2.1~18.04.22
fips-updates/focal

released

1.1.1f-1ubuntu2.fips.18
fips-updates/jammy

released

3.0.2-0ubuntu1.9+Fips1

Показывать по

РелизСтатусПримечание
bionic

released

1.0.2n-1ubuntu5.12
esm-infra/bionic

not-affected

1.0.2n-1ubuntu5.12
esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

DNE

trusty

DNE

upstream

needs-triage

xenial

DNE

Показывать по

EPSS

Процентиль: 74%
0.00875
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.9
redhat
около 2 лет назад

A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 7.5
nvd
около 2 лет назад

A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 7.5
msrc
около 2 лет назад

Описание отсутствует

CVSS3: 7.5
debian
около 2 лет назад

A security vulnerability has been identified in all supported versions ...

suse-cvrf
около 2 лет назад

Security update for openssl

EPSS

Процентиль: 74%
0.00875
Низкий

7.5 High

CVSS3

Уязвимость CVE-2023-0464