CVE-2021-23841

The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.9 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
opensslCNA
---
---
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 70%
VendorProductVersion
opensslopenssl
1.0.2 ≤
𝑥
< 1.0.2y
opensslopenssl
1.1.1 ≤
𝑥
< 1.1.1j
debiandebian_linux
10.0
tenablenessus_network_monitor
5.11.0
tenablenessus_network_monitor
5.11.1
tenablenessus_network_monitor
5.12.0
tenablenessus_network_monitor
5.12.1
tenablenessus_network_monitor
5.13.0
tenabletenable.sc
5.13.0 ≤
𝑥
≤ 5.17.0
applesafari
𝑥
< 14.1.1
appleipados
𝑥
< 14.6
appleiphone_os
𝑥
< 14.6
applemacos
11.1 ≤
𝑥
< 11.4
netapponcommand_insight
-
netapponcommand_workflow_automation
-
netappsnapcenter
-
oraclebusiness_intelligence
5.5.0.0.0
oraclebusiness_intelligence
5.9.0.0.0
oraclebusiness_intelligence
12.2.1.3.0
oraclebusiness_intelligence
12.2.1.4.0
oraclecommunications_cloud_native_core_policy
1.15.0
oracleenterprise_manager_for_storage_management
13.4.0.0
oracleenterprise_manager_ops_center
12.4.0.0
oracleessbase
21.2
oraclegraalvm
19.3.5
oraclegraalvm
20.3.1.2
oraclegraalvm
21.0.0.2
oraclemysql_enterprise_monitor
𝑥
< 8.0.23
oraclemysql_server
𝑥
< 5.7.33
oraclemysql_server
8.0.15 ≤
𝑥
< 8.0.23
oraclepeoplesoft_enterprise_peopletools
8.57
oraclepeoplesoft_enterprise_peopletools
8.58
oraclepeoplesoft_enterprise_peopletools
8.59
oraclezfs_storage_appliance_kit
8.8
siemenssinec_ins
𝑥
< 1.0
siemenssinec_ins
1.0
siemenssinec_ins
1.0:sp1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssl
bullseye
1.1.1w-0+deb11u1
fixed
bullseye (security)
1.1.1w-0+deb11u2
fixed
bookworm
3.0.14-1~deb12u1
fixed
bookworm (security)
3.0.14-1~deb12u2
fixed
sid
3.3.2-2
fixed
trixie
3.3.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
edk2
groovy
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
dne
nodejs
groovy
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected
openssl
groovy
Fixed 1.1.1f-1ubuntu4.2
released
focal
Fixed 1.1.1f-1ubuntu2.2
released
bionic
Fixed 1.1.1-1ubuntu2.1~18.04.8
released
xenial
Fixed 1.0.2g-1ubuntu4.19
released
trusty
Fixed 1.0.1f-1ubuntu2.27+esm2
released
openssl1.0
groovy
dne
focal
dne
bionic
Fixed 1.0.2n-1ubuntu5.6
released
xenial
dne
trusty
dne
References