Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-12797

Опубликовано: 11 фев. 2025
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS3: 6.3

Описание

Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a server may fail to notice that the server was not authenticated, because handshakes don't abort as expected when the SSL_VERIFY_PEER verification mode is set. Impact summary: TLS and DTLS connections using raw public keys may be vulnerable to man-in-middle attacks when server authentication failure is not detected by clients. RPKs are disabled by default in both TLS clients and TLS servers. The issue only arises when TLS clients explicitly enable RPK use by the server, and the server, likewise, enables sending of an RPK instead of an X.509 certificate chain. The affected clients are those that then rely on the handshake to fail when the server's RPK fails to match one of the expected public keys, by setting the verification mode to SSL_VERIFY_PEER. Clients that enable server-side raw public keys can still find out that raw public key verification failed by calling SSL_get_verify_result(), and those that ...

РелизСтатусПримечание
devel

not-affected

OpenSSL 3.2+ only
esm-apps/bionic

not-affected

OpenSSL 3.2+ only
esm-apps/xenial

not-affected

OpenSSL 3.2+ only
esm-infra/focal

not-affected

OpenSSL 3.2+ only
focal

not-affected

OpenSSL 3.2+ only
jammy

not-affected

OpenSSL 3.2+ only
noble

not-affected

OpenSSL 3.2+ only
oracular

not-affected

OpenSSL 3.2+ only
plucky

not-affected

OpenSSL 3.2+ only
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

not-affected

uses system openssl
esm-apps/bionic

not-affected

OpenSSL 3.2+ only
esm-apps/focal

not-affected

OpenSSL 3.2+ only
esm-apps/jammy

not-affected

OpenSSL 3.2+ only
esm-apps/noble

not-affected

uses system openssl
esm-apps/xenial

not-affected

OpenSSL 3.2+ only
esm-infra-legacy/trusty

not-affected

uses system openssl
focal

not-affected

uses system openssl
jammy

not-affected

OpenSSL 3.2+ only
noble

not-affected

uses system openssl

Показывать по

РелизСтатусПримечание
devel

released

3.4.1-1ubuntu1
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/focal

not-affected

code not present
esm-infra/xenial

not-affected

code not present
fips-preview/jammy

not-affected

code not present
fips-updates/bionic

not-affected

code not present
fips-updates/focal

not-affected

code not present
fips-updates/jammy

not-affected

code not present
fips-updates/xenial

not-affected

code not present

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/bionic

not-affected

code not present
esm-infra/focal

DNE

focal

DNE

jammy

DNE

noble

DNE

oracular

DNE

plucky

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 40%
0.00175
Низкий

6.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.4
redhat
6 месяцев назад

Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a server may fail to notice that the server was not authenticated, because handshakes don't abort as expected when the SSL_VERIFY_PEER verification mode is set. Impact summary: TLS and DTLS connections using raw public keys may be vulnerable to man-in-middle attacks when server authentication failure is not detected by clients. RPKs are disabled by default in both TLS clients and TLS servers. The issue only arises when TLS clients explicitly enable RPK use by the server, and the server, likewise, enables sending of an RPK instead of an X.509 certificate chain. The affected clients are those that then rely on the handshake to fail when the server's RPK fails to match one of the expected public keys, by setting the verification mode to SSL_VERIFY_PEER. Clients that enable server-side raw public keys can still find out that raw public key verification failed by calling SSL_get_verify_result(), and those that ...

CVSS3: 6.3
nvd
6 месяцев назад

Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a server may fail to notice that the server was not authenticated, because handshakes don't abort as expected when the SSL_VERIFY_PEER verification mode is set. Impact summary: TLS and DTLS connections using raw public keys may be vulnerable to man-in-middle attacks when server authentication failure is not detected by clients. RPKs are disabled by default in both TLS clients and TLS servers. The issue only arises when TLS clients explicitly enable RPK use by the server, and the server, likewise, enables sending of an RPK instead of an X.509 certificate chain. The affected clients are those that then rely on the handshake to fail when the server's RPK fails to match one of the expected public keys, by setting the verification mode to SSL_VERIFY_PEER. Clients that enable server-side raw public keys can still find out that raw public key verification failed by calling SSL_get_verify_result(), and those that

CVSS3: 6.3
msrc
6 месяцев назад

Описание отсутствует

CVSS3: 6.3
debian
6 месяцев назад

Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authent ...

github
6 месяцев назад

Vulnerable OpenSSL included in cryptography wheels

EPSS

Процентиль: 40%
0.00175
Низкий

6.3 Medium

CVSS3