Логотип exploitDog
bind:"BDU:2023-04973" OR bind:"CVE-2023-0466"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2023-04973" OR bind:"CVE-2023-0466"

Количество 18

Количество 18

fstec логотип

BDU:2023-04973

около 2 лет назад

Уязвимость функции X509_VERIFY_PARAM_add0_policy() библиотеки OpenSSL, позволяющая нарушителю выполнить атаку типа «человек посередине»

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2023-0466

около 2 лет назад

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2023-0466

около 2 лет назад

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2023-0466

около 2 лет назад

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2023-0466

около 2 лет назад

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2023-0466

около 2 лет назад

The function X509_VERIFY_PARAM_add0_policy() is documented to implicit ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-pxvj-4wx4-gv6w

около 2 лет назад

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1926-1

около 2 лет назад

Security update for openssl1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1922-1

около 2 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1914-1

около 2 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1911-1

около 2 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1908-1

около 2 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1907-1

около 2 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1898-1

около 2 лет назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1794-1

около 2 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1790-1

около 2 лет назад

Security update for openssl-1_1

EPSS: Низкий
oracle-oval логотип

ELSA-2023-3722

почти 2 года назад

ELSA-2023-3722: openssl security and bug fix update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-12768

почти 2 года назад

ELSA-2023-12768: openssl security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2023-04973

Уязвимость функции X509_VERIFY_PARAM_add0_policy() библиотеки OpenSSL, позволяющая нарушителю выполнить атаку типа «человек посередине»

CVSS3: 5.3
1%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-0466

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

CVSS3: 5.3
1%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-0466

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

CVSS3: 5.3
1%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-0466

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

CVSS3: 5.3
1%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 5.3
1%
Низкий
около 2 лет назад
debian логотип
CVE-2023-0466

The function X509_VERIFY_PARAM_add0_policy() is documented to implicit ...

CVSS3: 5.3
1%
Низкий
около 2 лет назад
github логотип
GHSA-pxvj-4wx4-gv6w

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

CVSS3: 5.3
1%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1926-1

Security update for openssl1

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1922-1

Security update for openssl-1_0_0

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1914-1

Security update for openssl-1_0_0

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1911-1

Security update for openssl-1_1

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1908-1

Security update for openssl-1_1

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1907-1

Security update for openssl

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1898-1

Security update for openssl-3

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1794-1

Security update for openssl-1_1

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1790-1

Security update for openssl-1_1

около 2 лет назад
oracle-oval логотип
ELSA-2023-3722

ELSA-2023-3722: openssl security and bug fix update (MODERATE)

почти 2 года назад
oracle-oval логотип
ELSA-2023-12768

ELSA-2023-12768: openssl security update (IMPORTANT)

почти 2 года назад

Уязвимостей на страницу