CVE-2023-0286

There is a type confusion vulnerability relating to X.400 address processing
inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but
the public structure definition for GENERAL_NAME incorrectly specified the type
of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by
the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an
ASN1_STRING.

When CRL checking is enabled (i.e. the application sets the
X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass
arbitrary pointers to a memcmp call, enabling them to read memory contents or
enact a denial of service. In most cases, the attack requires the attacker to
provide both the certificate chain and CRL, neither of which need to have a
valid signature. If the attacker only controls one of these inputs, the other
input must already contain an X.400 address as a CRL distribution point, which
is uncommon. As such, this vulnerability is most likely to only affect
applications which have implemented their own functionality for retrieving CRLs
over a network.
Type Confusion
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.4 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
opensslCNA
---
---
CVEADP
---
---
CISA-ADPADP
7.4 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
VendorProductVersion
opensslopenssl
1.0.2 ≤
𝑥
< 1.0.2zg
opensslopenssl
1.1.1 ≤
𝑥
< 1.1.1t
opensslopenssl
3.0.0 ≤
𝑥
< 3.0.8
stormshieldstormshield_management_center
𝑥
< 3.3.3
stormshieldstormshield_network_security
2.7.0 ≤
𝑥
< 2.7.11
stormshieldstormshield_network_security
2.8.0 ≤
𝑥
< 3.7.34
stormshieldstormshield_network_security
3.8.0 ≤
𝑥
< 3.11.22
stormshieldstormshield_network_security
4.0.0 ≤
𝑥
< 4.3.16
stormshieldstormshield_network_security
4.4.0 ≤
𝑥
< 4.6.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssl
bullseye
1.1.1w-0+deb11u1
fixed
bullseye (security)
1.1.1w-0+deb11u2
fixed
bookworm
3.0.15-1~deb12u1
fixed
bookworm (security)
3.0.14-1~deb12u2
fixed
sid
3.3.2-2
fixed
trixie
3.3.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
edk2
oracular
not-affected
noble
not-affected
mantic
not-affected
lunar
ignored
kinetic
ignored
jammy
needs-triage
focal
needs-triage
bionic
needs-triage
xenial
needs-triage
trusty
ignored
nodejs
oracular
not-affected
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
Fixed 12.22.9~dfsg-1ubuntu3.3
released
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected
openssl
oracular
Fixed 3.0.8-1ubuntu1
released
noble
Fixed 3.0.8-1ubuntu1
released
mantic
Fixed 3.0.8-1ubuntu1
released
lunar
Fixed 3.0.8-1ubuntu1
released
kinetic
Fixed 3.0.5-2ubuntu2.1
released
jammy
Fixed 3.0.2-0ubuntu1.8
released
focal
Fixed 1.1.1f-1ubuntu2.17
released
bionic
Fixed 1.1.1-1ubuntu2.1~18.04.21
released
xenial
Fixed 1.0.2g-1ubuntu4.20+esm6
released
trusty
Fixed 1.0.1f-1ubuntu2.27+esm6
released
openssl1.0
kinetic
dne
jammy
dne
focal
dne
bionic
Fixed 1.0.2n-1ubuntu5.11
released
xenial
dne
trusty
dne