OpenSSL up to 1.0.2zg/1.1.1t/3.0.8/3.1.0 X.509 Certificate X509_VERIFY_PARAM_set1_policies resource consumption
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.2 | $0-$5k | 0.00 |
A vulnerability, which was classified as problematic, has been found in OpenSSL up to 1.0.2zg/1.1.1t/3.0.8/3.1.0 (Network Encryption Software). This issue affects the function X509_VERIFY_PARAM_set1_policies
of the component X.509 Certificate Handler. The manipulation with an unknown input leads to a resource consumption vulnerability. Using CWE to declare the problem leads to CWE-400. The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. Impacted is availability. The summary by CVE is:
A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.
The weakness was shared 03/22/2023 as 20230322.txt. The advisory is shared at openssl.org. The identification of this vulnerability is CVE-2023-0464 since 01/24/2023. Technical details are known, but no exploit is available. The price for an exploit might be around USD $0-$5k at the moment (estimation calculated on 04/13/2023). MITRE ATT&CK project uses the attack technique T1499 for this issue.
Upgrading to version 1.0.2zh, 1.1.1u, 3.0.9 or 3.1.1 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at git.openssl.org. The best possible mitigation is suggested to be upgrading to the latest version.
The entry VDB-234982 is related to this item.
Product
Type
Name
Version
- 1.0.2za
- 1.0.2zb
- 1.0.2zc
- 1.0.2zd
- 1.0.2ze
- 1.0.2zf
- 1.0.2zg
- 1.1.1
- 1.1.1a
- 1.1.1b
- 1.1.1c
- 1.1.1d
- 1.1.1e
- 1.1.1f
- 1.1.1g
- 1.1.1h
- 1.1.1i
- 1.1.1j
- 1.1.1k
- 1.1.1l
- 1.1.1m
- 1.1.1n
- 1.1.1o
- 1.1.1p
- 1.1.1q
- 1.1.1r
- 1.1.1s
- 1.1.1t
- 3.0
- 3.0.0
- 3.0.1
- 3.0.2
- 3.0.3
- 3.0.4
- 3.0.5
- 3.0.6
- 3.0.7
- 3.0.8
- 3.1
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 5.2
VulDB Base Score: 3.1
VulDB Temp Score: 3.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 7.5
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Resource consumptionCWE: CWE-400 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: OpenSSL 1.0.2zh/1.1.1u/3.0.9/3.1.1
Patch: 2dcd4f1e3115f38cefa43e3efbe9b801c27e642e
Timeline
01/24/2023 🔍03/22/2023 🔍
03/22/2023 🔍
04/13/2023 🔍
Sources
Product: openssl.orgAdvisory: 20230322.txt
Status: Confirmed
CVE: CVE-2023-0464 (🔍)
See also: 🔍
Entry
Created: 03/22/2023 18:35Updated: 04/13/2023 06:33
Changes: 03/22/2023 18:35 (43), 04/13/2023 06:24 (1), 04/13/2023 06:33 (11)
Complete: 🔍
Cache ID: 13:D9E:103
No comments yet. Languages: en.
Please log in to comment.