CVE-2023-0465

Name
CVE-2023-0465
Description
Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=facfb1ab745646e97a1920977ae4a9965ea61d5c
MISC https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1dd43e0709fece299b15208f36cc7c76209ba0bb
MISC https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b013765abfa80036dc779dd0e50602c57bb3bf95
MISC https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=10325176f3d3e98c6e2b3bf5ab1e3b334de6947a
MISC https://www.openssl.org/news/secadv/20230328.txt
MISC https://security.netapp.com/advisory/ntap-20230414-0001/
MISC https://www.debian.org/security/2023/dsa-5417
MISC https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html
openssl-security@openssl.org https://security.gentoo.org/glsa/202402-08

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* openssl >= 3.1.0 < 3.1.1
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* openssl >= 3.0.0 < 3.0.9
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* openssl >= 1.1.1 < 1.1.1u
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* openssl >= 1.0.2 < 1.0.2zh

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
openssl1.1-compat 3.17-community 1.1.1t-r2 Timo Teras <timo.teras@iki.fi> fixed
openssl 3.14-main 1.1.1t-r2 Timo Teras <timo.teras@iki.fi> fixed