发布时间: 2023年2月13日
修改时间: 2024年11月30日
A flaw was found in Open SSL. A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification, and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer.
NVD | openEuler | |
---|---|---|
Confidentiality | None | Low |
Attack Vector | Network | Network |
CVSS评分 | 4.9 | 6.5 |
Attack Complexity | Low | High |
Privileges Required | High | None |
Scope | Unchanged | Unchanged |
Integrity | None | None |
User Interaction | None | None |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2023-1063 | A flaw was found in Open SSL. A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification, and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. | 2023年2月13日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | openssl | Unaffected |
KY3.4-5A | openssl | Unaffected |
KY3.5.1 | openssl | Unaffected |
KY3.5.2 | openssl | Unaffected |