Логотип exploitDog
bind:"BDU:2023-03312" OR bind:"CVE-2023-0465"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2023-03312" OR bind:"CVE-2023-0465"

Количество 21

Количество 21

fstec логотип

BDU:2023-03312

около 2 лет назад

Уязвимость криптографической библиотеки OpenSSL, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю обойти проверку политик для сертификата

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2023-0465

около 2 лет назад

Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2023-0465

около 2 лет назад

Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2023-0465

около 2 лет назад

Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2023-0465

около 2 лет назад

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2023-0465

около 2 лет назад

Applications that use a non-default option when verifying certificates ...

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1960-1

около 2 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1912-1

около 2 лет назад

Security update for compat-openssl098

EPSS: Низкий
redos логотип

ROS-20230619-04

около 2 лет назад

Уязвимость OpenSSL

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-77f3-6546-6rj7

около 2 лет назад

Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1926-1

около 2 лет назад

Security update for openssl1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1922-1

около 2 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1914-1

около 2 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1911-1

около 2 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1908-1

около 2 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1907-1

около 2 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1898-1

около 2 лет назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1794-1

около 2 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1790-1

около 2 лет назад

Security update for openssl-1_1

EPSS: Низкий
oracle-oval логотип

ELSA-2023-3722

почти 2 года назад

ELSA-2023-3722: openssl security and bug fix update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2023-03312

Уязвимость криптографической библиотеки OpenSSL, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю обойти проверку политик для сертификата

CVSS3: 5.3
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-0465

Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 5.3
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-0465

Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 5.3
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-0465

Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 5.3
0%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 5.3
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-0465

Applications that use a non-default option when verifying certificates ...

CVSS3: 5.3
0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1960-1

Security update for openssl

0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1912-1

Security update for compat-openssl098

0%
Низкий
около 2 лет назад
redos логотип
ROS-20230619-04

Уязвимость OpenSSL

CVSS3: 5.3
0%
Низкий
около 2 лет назад
github логотип
GHSA-77f3-6546-6rj7

Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 5.3
0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1926-1

Security update for openssl1

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1922-1

Security update for openssl-1_0_0

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1914-1

Security update for openssl-1_0_0

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1911-1

Security update for openssl-1_1

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1908-1

Security update for openssl-1_1

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1907-1

Security update for openssl

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1898-1

Security update for openssl-3

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1794-1

Security update for openssl-1_1

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1790-1

Security update for openssl-1_1

около 2 лет назад
oracle-oval логотип
ELSA-2023-3722

ELSA-2023-3722: openssl security and bug fix update (MODERATE)

почти 2 года назад

Уязвимостей на страницу