Select your cookie preferences

We use cookies and similar tools to enhance your experience, provide our services, deliver relevant advertising, and make improvements. Approved third parties also use these tools to help us deliver advertising and provide certain site features.

CVE-2023-0465

Public on 2023-03-28
Modified on 2023-08-23
Description

Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

Severity
Medium
See what this means
CVSS v3 Base Score
5.3
See breakdown
Continue reading

Affected Packages

Platform Package Release Date Advisory
Amazon Linux 1 openssl 2023-06-05 16:39 ALAS-2023-1762
Amazon Linux 2 - Core openssl 2023-06-05 16:39 ALAS2-2023-2073
Amazon Linux 2023 openssl 2023-05-11 17:49 ALAS2023-2023-181
Amazon Linux 2 - Openssl-snapsafe Extra openssl-snapsafe 2023-07-17 19:30 ALAS2OPENSSL-SNAPSAFE-2023-002
Amazon Linux 2 - Core openssl11 2023-05-11 17:49 ALAS2-2023-2039
Amazon Linux 2 - Core edk2 2024-03-13 20:26 ALAS2-2024-2502

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
NVD CVSSv3 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N