CVE-2023-0286
X.400 address type confusion in X.509 GeneralName
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
There is a type confusion vulnerability relating to X.400 address processing
inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but
the public structure definition for GENERAL_NAME incorrectly specified the type
of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by
the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an
ASN1_STRING. When CRL checking is enabled (i.e. the application sets the
X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass
arbitrary pointers to a memcmp call, enabling them to read memory contents or
enact a denial of service. In most cases, the attack requires the attacker to
provide both the certificate chain and CRL, neither of which need to have a
valid signature. If the attacker only controls one of these inputs, the other
input must already contain an X.400 address as a CRL distribution point, which
is uncommon. As such, this vulnerability is most likely to only affect
applications which have implemented their own functionality for retrieving CRLs
over a network.
A type confusion vulnerability was found in OpenSSL when OpenSSL X.400 addresses processing inside an X.509 GeneralName. When CRL checking is enabled (for example, the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or cause a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, of which neither needs a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. In this case, this vulnerability is likely only to affect applications that have implemented their own functionality for retrieving CRLs over a network.
There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.
Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience. This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.51 Service Pack 2 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.51 Service Pack 1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include bypass, denial of service, double free, out of bounds read, out of bounds write, and use-after-free vulnerabilities.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2023-01-13 CVE Reserved
- 2023-02-07 CVE Published
- 2025-03-20 CVE Updated
- 2025-04-03 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-704: Incorrect Type Conversion or Cast
- CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.2-relnotes.txt | Third Party Advisory | |
https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/018_x509.patch.sig | Third Party Advisory | |
https://security.gentoo.org/glsa/202402-08 |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.openssl.org/news/secadv/20230207.txt | 2024-02-04 | |
https://access.redhat.com/security/cve/CVE-2023-0286 | 2024-09-11 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2164440 | 2024-09-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Openssl Search vendor "Openssl" | Openssl Search vendor "Openssl" for product "Openssl" | >= 1.0.2 < 1.0.2zg Search vendor "Openssl" for product "Openssl" and version " >= 1.0.2 < 1.0.2zg" | - |
Affected
| ||||||
Openssl Search vendor "Openssl" | Openssl Search vendor "Openssl" for product "Openssl" | >= 1.1.1 < 1.1.1t Search vendor "Openssl" for product "Openssl" and version " >= 1.1.1 < 1.1.1t" | - |
Affected
| ||||||
Openssl Search vendor "Openssl" | Openssl Search vendor "Openssl" for product "Openssl" | >= 3.0.0 < 3.0.8 Search vendor "Openssl" for product "Openssl" and version " >= 3.0.0 < 3.0.8" | - |
Affected
| ||||||
Stormshield Search vendor "Stormshield" | Stormshield Management Center Search vendor "Stormshield" for product "Stormshield Management Center" | < 3.3.3 Search vendor "Stormshield" for product "Stormshield Management Center" and version " < 3.3.3" | - |
Affected
| ||||||
Stormshield Search vendor "Stormshield" | Stormshield Network Security Search vendor "Stormshield" for product "Stormshield Network Security" | >= 2.7.0 < 2.7.11 Search vendor "Stormshield" for product "Stormshield Network Security" and version " >= 2.7.0 < 2.7.11" | - |
Affected
| ||||||
Stormshield Search vendor "Stormshield" | Stormshield Network Security Search vendor "Stormshield" for product "Stormshield Network Security" | >= 2.8.0 < 3.7.34 Search vendor "Stormshield" for product "Stormshield Network Security" and version " >= 2.8.0 < 3.7.34" | - |
Affected
| ||||||
Stormshield Search vendor "Stormshield" | Stormshield Network Security Search vendor "Stormshield" for product "Stormshield Network Security" | >= 3.8.0 < 3.11.22 Search vendor "Stormshield" for product "Stormshield Network Security" and version " >= 3.8.0 < 3.11.22" | - |
Affected
| ||||||
Stormshield Search vendor "Stormshield" | Stormshield Network Security Search vendor "Stormshield" for product "Stormshield Network Security" | >= 4.0.0 < 4.3.16 Search vendor "Stormshield" for product "Stormshield Network Security" and version " >= 4.0.0 < 4.3.16" | - |
Affected
| ||||||
Stormshield Search vendor "Stormshield" | Stormshield Network Security Search vendor "Stormshield" for product "Stormshield Network Security" | >= 4.4.0 < 4.6.3 Search vendor "Stormshield" for product "Stormshield Network Security" and version " >= 4.4.0 < 4.6.3" | - |
Affected
|