Логотип exploitDog
bind:"BDU:2023-04973" OR bind:"CVE-2023-0466"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2023-04973" OR bind:"CVE-2023-0466"

Количество 19

Количество 19

fstec логотип

BDU:2023-04973

почти 3 года назад

Уязвимость функции X509_VERIFY_PARAM_add0_policy() библиотеки OpenSSL, позволяющая нарушителю выполнить атаку типа «человек посередине»

CVSS3: 5.3
EPSS: Низкий
redos логотип

ROS-20251016-04

3 месяца назад

Множественные уязвимости edk2-tools

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2023-0466

почти 3 года назад

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2023-0466

почти 3 года назад

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2023-0466

почти 3 года назад

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2023-0466

больше 2 лет назад

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2023-0466

почти 3 года назад

The function X509_VERIFY_PARAM_add0_policy() is documented to implicit ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-pxvj-4wx4-gv6w

почти 3 года назад

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1926-1

больше 2 лет назад

Security update for openssl1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1922-1

больше 2 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1914-1

больше 2 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1911-1

больше 2 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1908-1

больше 2 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1907-1

больше 2 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1898-1

больше 2 лет назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1794-1

больше 2 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1790-1

больше 2 лет назад

Security update for openssl-1_1

EPSS: Низкий
oracle-oval логотип

ELSA-2023-3722

больше 2 лет назад

ELSA-2023-3722: openssl security and bug fix update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-12768

больше 2 лет назад

ELSA-2023-12768: openssl security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2023-04973

Уязвимость функции X509_VERIFY_PARAM_add0_policy() библиотеки OpenSSL, позволяющая нарушителю выполнить атаку типа «человек посередине»

CVSS3: 5.3
1%
Низкий
почти 3 года назад
redos логотип
ROS-20251016-04

Множественные уязвимости edk2-tools

CVSS3: 9.8
3 месяца назад
ubuntu логотип
CVE-2023-0466

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

CVSS3: 5.3
1%
Низкий
почти 3 года назад
redhat логотип
CVE-2023-0466

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

CVSS3: 5.3
1%
Низкий
почти 3 года назад
nvd логотип
CVE-2023-0466

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

CVSS3: 5.3
1%
Низкий
почти 3 года назад
msrc логотип
CVSS3: 5.3
1%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-0466

The function X509_VERIFY_PARAM_add0_policy() is documented to implicit ...

CVSS3: 5.3
1%
Низкий
почти 3 года назад
github логотип
GHSA-pxvj-4wx4-gv6w

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

CVSS3: 5.3
1%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:1926-1

Security update for openssl1

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1922-1

Security update for openssl-1_0_0

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1914-1

Security update for openssl-1_0_0

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1911-1

Security update for openssl-1_1

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1908-1

Security update for openssl-1_1

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1907-1

Security update for openssl

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1898-1

Security update for openssl-3

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1794-1

Security update for openssl-1_1

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1790-1

Security update for openssl-1_1

больше 2 лет назад
oracle-oval логотип
ELSA-2023-3722

ELSA-2023-3722: openssl security and bug fix update (MODERATE)

больше 2 лет назад
oracle-oval логотип
ELSA-2023-12768

ELSA-2023-12768: openssl security update (IMPORTANT)

больше 2 лет назад

Уязвимостей на страницу