// For flags

CVE-2023-0286

X.400 address type confusion in X.509 GeneralName

Severity Score

7.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

There is a type confusion vulnerability relating to X.400 address processing
inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but
the public structure definition for GENERAL_NAME incorrectly specified the type
of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by
the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an
ASN1_STRING. When CRL checking is enabled (i.e. the application sets the
X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass
arbitrary pointers to a memcmp call, enabling them to read memory contents or
enact a denial of service. In most cases, the attack requires the attacker to
provide both the certificate chain and CRL, neither of which need to have a
valid signature. If the attacker only controls one of these inputs, the other
input must already contain an X.400 address as a CRL distribution point, which
is uncommon. As such, this vulnerability is most likely to only affect
applications which have implemented their own functionality for retrieving CRLs
over a network.

A type confusion vulnerability was found in OpenSSL when OpenSSL X.400 addresses processing inside an X.509 GeneralName. When CRL checking is enabled (for example, the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or cause a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, of which neither needs a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. In this case, this vulnerability is likely only to affect applications that have implemented their own functionality for retrieving CRLs over a network.

There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.

Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience. This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.51 Service Pack 2 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.51 Service Pack 1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include bypass, denial of service, double free, out of bounds read, out of bounds write, and use-after-free vulnerabilities.

*Credits: David Benjamin (Google), Hugo Landau
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Complete
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2023-01-13 CVE Reserved
  • 2023-02-07 CVE Published
  • 2025-03-20 CVE Updated
  • 2025-04-03 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-704: Incorrect Type Conversion or Cast
  • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Openssl
Search vendor "Openssl"
Openssl
Search vendor "Openssl" for product "Openssl"
>= 1.0.2 < 1.0.2zg
Search vendor "Openssl" for product "Openssl" and version " >= 1.0.2 < 1.0.2zg"
-
Affected
Openssl
Search vendor "Openssl"
Openssl
Search vendor "Openssl" for product "Openssl"
>= 1.1.1 < 1.1.1t
Search vendor "Openssl" for product "Openssl" and version " >= 1.1.1 < 1.1.1t"
-
Affected
Openssl
Search vendor "Openssl"
Openssl
Search vendor "Openssl" for product "Openssl"
>= 3.0.0 < 3.0.8
Search vendor "Openssl" for product "Openssl" and version " >= 3.0.0 < 3.0.8"
-
Affected
Stormshield
Search vendor "Stormshield"
Stormshield Management Center
Search vendor "Stormshield" for product "Stormshield Management Center"
< 3.3.3
Search vendor "Stormshield" for product "Stormshield Management Center" and version " < 3.3.3"
-
Affected
Stormshield
Search vendor "Stormshield"
Stormshield Network Security
Search vendor "Stormshield" for product "Stormshield Network Security"
>= 2.7.0 < 2.7.11
Search vendor "Stormshield" for product "Stormshield Network Security" and version " >= 2.7.0 < 2.7.11"
-
Affected
Stormshield
Search vendor "Stormshield"
Stormshield Network Security
Search vendor "Stormshield" for product "Stormshield Network Security"
>= 2.8.0 < 3.7.34
Search vendor "Stormshield" for product "Stormshield Network Security" and version " >= 2.8.0 < 3.7.34"
-
Affected
Stormshield
Search vendor "Stormshield"
Stormshield Network Security
Search vendor "Stormshield" for product "Stormshield Network Security"
>= 3.8.0 < 3.11.22
Search vendor "Stormshield" for product "Stormshield Network Security" and version " >= 3.8.0 < 3.11.22"
-
Affected
Stormshield
Search vendor "Stormshield"
Stormshield Network Security
Search vendor "Stormshield" for product "Stormshield Network Security"
>= 4.0.0 < 4.3.16
Search vendor "Stormshield" for product "Stormshield Network Security" and version " >= 4.0.0 < 4.3.16"
-
Affected
Stormshield
Search vendor "Stormshield"
Stormshield Network Security
Search vendor "Stormshield" for product "Stormshield Network Security"
>= 4.4.0 < 4.6.3
Search vendor "Stormshield" for product "Stormshield Network Security" and version " >= 4.4.0 < 4.6.3"
-
Affected