Количество 10
Количество 10

CVE-2022-1343
The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most users of `OCSP_basic_verify` will not use the OCSP_NOCHECKS flag. In this case the `OCSP_basic_verify` function will return a negative value (indicating a fatal error) in the case of a certificate verification failure. The normal expected return value in this case would be 0. This issue also impacts the command line OpenSSL "ocsp" application. When verifying an ocsp response with the "-no_cert_checks" option the command line application will report that the verification is successful even though it has in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successfu...

CVE-2022-1343
The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most users of `OCSP_basic_verify` will not use the OCSP_NOCHECKS flag. In this case the `OCSP_basic_verify` function will return a negative value (indicating a fatal error) in the case of a certificate verification failure. The normal expected return value in this case would be 0. This issue also impacts the command line OpenSSL "ocsp" application. When verifying an ocsp response with the "-no_cert_checks" option the command line application will report that the verification is successful even though it has in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successfu...

CVE-2022-1343
The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most users of `OCSP_basic_verify` will not use the OCSP_NOCHECKS flag. In this case the `OCSP_basic_verify` function will return a negative value (indicating a fatal error) in the case of a certificate verification failure. The normal expected return value in this case would be 0. This issue also impacts the command line OpenSSL "ocsp" application. When verifying an ocsp response with the "-no_cert_checks" option the command line application will report that the verification is successful even though it has in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful r
CVE-2022-1343
The function `OCSP_basic_verify` verifies the signer certificate on an ...
GHSA-mfm6-r9g2-q4r7
`OCSP_basic_verify` may incorrectly verify the response signing certificate

BDU:2022-03175
Уязвимость реализации функции OCSP_basic_verify() библиотеки OpenSSL, позволяющая нарушителю реализовать атаку типа «человек посередине»
ELSA-2022-9751
ELSA-2022-9751: openssl security update (MODERATE)
ELSA-2022-6224
ELSA-2022-6224: openssl security and bug fix update (MODERATE)

SUSE-SU-2022:2306-1
Security update for openssl-3

ROS-20220524-01
Множественные уязвимости OpenSSL
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2022-1343 The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most users of `OCSP_basic_verify` will not use the OCSP_NOCHECKS flag. In this case the `OCSP_basic_verify` function will return a negative value (indicating a fatal error) in the case of a certificate verification failure. The normal expected return value in this case would be 0. This issue also impacts the command line OpenSSL "ocsp" application. When verifying an ocsp response with the "-no_cert_checks" option the command line application will report that the verification is successful even though it has in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successfu... | CVSS3: 5.3 | 0% Низкий | около 3 лет назад |
![]() | CVE-2022-1343 The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most users of `OCSP_basic_verify` will not use the OCSP_NOCHECKS flag. In this case the `OCSP_basic_verify` function will return a negative value (indicating a fatal error) in the case of a certificate verification failure. The normal expected return value in this case would be 0. This issue also impacts the command line OpenSSL "ocsp" application. When verifying an ocsp response with the "-no_cert_checks" option the command line application will report that the verification is successful even though it has in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successfu... | CVSS3: 5.3 | 0% Низкий | около 3 лет назад |
![]() | CVE-2022-1343 The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most users of `OCSP_basic_verify` will not use the OCSP_NOCHECKS flag. In this case the `OCSP_basic_verify` function will return a negative value (indicating a fatal error) in the case of a certificate verification failure. The normal expected return value in this case would be 0. This issue also impacts the command line OpenSSL "ocsp" application. When verifying an ocsp response with the "-no_cert_checks" option the command line application will report that the verification is successful even though it has in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful r | CVSS3: 5.3 | 0% Низкий | около 3 лет назад |
CVE-2022-1343 The function `OCSP_basic_verify` verifies the signer certificate on an ... | CVSS3: 5.3 | 0% Низкий | около 3 лет назад | |
GHSA-mfm6-r9g2-q4r7 `OCSP_basic_verify` may incorrectly verify the response signing certificate | CVSS3: 5.3 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2022-03175 Уязвимость реализации функции OCSP_basic_verify() библиотеки OpenSSL, позволяющая нарушителю реализовать атаку типа «человек посередине» | CVSS3: 4.8 | 0% Низкий | около 3 лет назад |
ELSA-2022-9751 ELSA-2022-9751: openssl security update (MODERATE) | почти 3 года назад | |||
ELSA-2022-6224 ELSA-2022-6224: openssl security and bug fix update (MODERATE) | почти 3 года назад | |||
![]() | SUSE-SU-2022:2306-1 Security update for openssl-3 | почти 3 года назад | ||
![]() | ROS-20220524-01 Множественные уязвимости OpenSSL | около 3 лет назад |
Уязвимостей на страницу