QID 520011

Date Published: 2023-03-30

QID 520011: Open Secure Sockets Layer (OpenSSL) Type Confusion Vulnerability (CVE-2023-0286)

OpenSSL is a software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end.

There is a security vulnerability related to the processing of X.400 addresses in an X.509 GeneralName. The issue is caused by a type confusion error in the way X.400 addresses are parsed as an ASN1_STRING but are specified as ASN1_TYPE in the GENERAL_NAME structure definition. This may allow an attacker to pass arbitrary pointers to a memcmp call, potentially enabling them to read memory contents or cause a denial of service attack. The attack may require the attacker to control both the certificate chain and CRL, and the vulnerability is most likely to affect applications with custom CRL retrieval functionality.

Affected Versions:
OpenSSL version 1.0.2 to 1.0.2zf
OpenSSL version 1.1.1 to 1.1.1q
OpenSSL version 3.0.0 to 3.0.7

QID Detection Logic: (Unauthenticated)
This QID checks for vulnerable version of OpenSSL by extracting OpenSSL version from HTTP response header.

If successfully exploited, this vulnerability could potentially allow an attacker to read sensitive memory contents or cause a denial of service attack.

  • CVSS V3 rated as High - 7.4 severity.
  • CVSS V2 rated as Critical - 9.4 severity.
  • Solution
    Vendor has released a patch to address these vulnerabilities. Customers are advised to refer to OpenSSL Security Advisory for more information pertaining to these vulnerabilities.

    Vendor References

    CVEs related to QID 520011

    Software Advisories
    Advisory ID Software Component Link
    OpenSSL URL Logo www.openssl.org/news/secadv/20230207.txt