VID |
210235 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The version of OpenSSL installed on the remote host is prior to 1.1.1t. It is, therefore, affected by multiple vulnerabilities as referenced in the 1.1.1t advisory.
- There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName.X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. (CVE-2023-0286)
- The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. (CVE-2023-0215)
- The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the name (e.g.CERTIFICATE), any header data and the payload data. If the function succeeds then the name_out, header and data arguments are populated with pointers to buffers containing the relevant decoded data.(CVE-2022-4450)
- A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption.(CVE-2022-4304)
* References: https://www.cve.org/CVERecord?id=CVE-2023-0286 https://www.openssl.org/news/secadv/20230207.txt https://www.openssl.org/policies/secpolicy.html https://www.cve.org/CVERecord?id=CVE-2023-0215 https://www.cve.org/CVERecord?id=CVE-2022-4450 https://www.cve.org/CVERecord?id=CVE-2022-4304
* Platforms Affected: OpenSSL 1.1.x before 1.1.1t Linux Any version Unix Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of OpenSSL (1.1.1t or later), available from the OpenSSL Web site at http://www.openssl.org/ |
Related URL |
CVE-2022-4304,CVE-2022-4450,CVE-2023-0215,CVE-2023-0286 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|