You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Applications that use a non-default option when verifying certificates may be
vulnerable to an attack from a malicious CA to circumvent certain checks.
Invalid certificate policies in leaf certificates are silently ignored by
OpenSSL and other certificate policy checks are skipped for that certificate.
A malicious CA could use this to deliberately assert invalid certificate policies
in order to circumvent policy checking on the certificate altogether.
Policy processing is disabled by default but can be enabled by passing
the -policy' argument to the command line utilities or by calling the X509_VERIFY_PARAM_set1_policies()' function.
CVE-2023-0465 - Medium Severity Vulnerability
Vulnerable Library - OpenSSLOpenSSL_1_1_1g
TLS/SSL and crypto library
Library home page: https://github.com/OpenSSL/OpenSSL.git
Found in HEAD commit: 00fdb00d5bdbaea4fec4642989374d82cbdb1a3c
Found in base branch: master
Vulnerable Source Files (2)
/deps/openssl/openssl/crypto/x509/x509_vfy.c
/deps/openssl/openssl/crypto/x509/x509_vfy.c
Vulnerability Details
Applications that use a non-default option when verifying certificates may be
vulnerable to an attack from a malicious CA to circumvent certain checks.
Invalid certificate policies in leaf certificates are silently ignored by
OpenSSL and other certificate policy checks are skipped for that certificate.
A malicious CA could use this to deliberately assert invalid certificate policies
in order to circumvent policy checking on the certificate altogether.
Policy processing is disabled by default but can be enabled by passing
the
-policy' argument to the command line utilities or by calling the
X509_VERIFY_PARAM_set1_policies()' function.Publish Date: 2023-03-28
URL: CVE-2023-0465
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.openssl.org/news/secadv/20230328.txt
Release Date: 2023-03-28
Fix Resolution: OpenSSL_1_1_1u,openssl-3.0.9,openssl-3.1.1
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: