VID |
210236 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The version of OpenSSL installed on the remote host is prior to 1.0.2zg. It is, therefore, affected by multiple vulnerabilities as referenced in the 1.0.2zg advisory.
- There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. (CVE-2023-0286)
- The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. (CVE-2023-0215)
- A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption.(CVE-2022-4304)
* References: https://www.cve.org/CVERecord?id=CVE-2023-0286 https://www.openssl.org/news/secadv/20230207.txt https://www.openssl.org/policies/secpolicy.html https://www.cve.org/CVERecord?id=CVE-2023-0215 https://www.cve.org/CVERecord?id=CVE-2022-4304
* Platforms Affected: OpenSSL 1.0.x before 1.0.2zg Linux Any version Unix Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of OpenSSL (1.0.2zg or later), available from the OpenSSL Web site at http://www.openssl.org/ |
Related URL |
CVE-2022-4304,CVE-2023-0215,CVE-2023-0286 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|