Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-0465

Опубликовано: 28 мар. 2023
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS3: 5.3

Описание

Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the -policy' argument to the command line utilities or by calling the X509_VERIFY_PARAM_set1_policies()' function.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

2023.11-5
esm-apps/bionic

needs-triage

esm-apps/xenial

needs-triage

esm-infra/focal

needed

focal

ignored

end of standard support, was needed
jammy

needed

kinetic

ignored

end of life, was needs-triage
lunar

ignored

end of life, was needs-triage
mantic

ignored

end of life, was needed

Показывать по

РелизСтатусПримечание
bionic

not-affected

uses system openssl1.0
devel

not-affected

uses system openssl
esm-apps/bionic

not-affected

uses system openssl1.0
esm-apps/focal

not-affected

uses system openssl
esm-apps/jammy

needed

esm-apps/noble

not-affected

uses system openssl
esm-apps/xenial

not-affected

uses system openssl
esm-infra-legacy/trusty

not-affected

uses system openssl
focal

not-affected

uses system openssl
jammy

needed

Показывать по

РелизСтатусПримечание
bionic

released

1.1.1-1ubuntu2.1~18.04.22
devel

released

3.0.8-1ubuntu2
esm-infra-legacy/trusty

not-affected

1.0.1f-1ubuntu2.27+esm7
esm-infra/bionic

not-affected

1.1.1-1ubuntu2.1~18.04.22
esm-infra/focal

not-affected

1.1.1f-1ubuntu2.18
esm-infra/xenial

released

1.0.2g-1ubuntu4.20+esm7
fips-preview/jammy

released

3.0.2-0ubuntu1.9+Fips1
fips-updates/bionic

released

1.1.1-1ubuntu2.fips.2.1~18.04.22
fips-updates/focal

released

1.1.1f-1ubuntu2.fips.18
fips-updates/jammy

released

3.0.2-0ubuntu1.9+Fips1

Показывать по

РелизСтатусПримечание
bionic

released

1.0.2n-1ubuntu5.12
devel

DNE

esm-infra/bionic

not-affected

1.0.2n-1ubuntu5.12
esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

DNE

lunar

DNE

mantic

DNE

noble

DNE

Показывать по

EPSS

Процентиль: 61%
0.00421
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
около 2 лет назад

Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 5.3
nvd
около 2 лет назад

Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 5.3
msrc
около 2 лет назад

Описание отсутствует

CVSS3: 5.3
debian
около 2 лет назад

Applications that use a non-default option when verifying certificates ...

suse-cvrf
около 2 лет назад

Security update for openssl

EPSS

Процентиль: 61%
0.00421
Низкий

5.3 Medium

CVSS3

Уязвимость CVE-2023-0465