摘要:
A flaw was found in Open SSL. A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification, and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer.
安全等级: Low
公告ID: KylinSec-SA-2023-1063
发布日期: 2023年2月13日
关联CVE: CVE-2022-4203
A flaw was found in Open SSL. A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification, and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2022-4203 | KY3.4-4A | openssl | Unaffected |
CVE-2022-4203 | KY3.4-5A | openssl | Unaffected |
CVE-2022-4203 | KY3.5.1 | openssl | Unaffected |
CVE-2022-4203 | KY3.5.2 | openssl | Unaffected |