Korean
<< Back
VID 210236
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The version of OpenSSL installed on the remote host is prior to 1.0.2zg. It is, therefore, affected by multiple vulnerabilities as referenced in the 1.0.2zg advisory.

- There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. (CVE-2023-0286)

- The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. (CVE-2023-0215)

- A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption.(CVE-2022-4304)

* References:
https://www.cve.org/CVERecord?id=CVE-2023-0286
https://www.openssl.org/news/secadv/20230207.txt
https://www.openssl.org/policies/secpolicy.html
https://www.cve.org/CVERecord?id=CVE-2023-0215
https://www.cve.org/CVERecord?id=CVE-2022-4304

* Platforms Affected:
OpenSSL 1.0.x before 1.0.2zg
Linux Any version
Unix Any version
Microsoft Windows Any version
Recommendation Upgrade to the latest version of OpenSSL (1.0.2zg or later), available from the OpenSSL Web site at http://www.openssl.org/
Related URL CVE-2022-4304,CVE-2023-0215,CVE-2023-0286 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)