CVE-2023-0464
ADVISORY - nistSummary
A security vulnerability has been identified in all supported versions
of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.
Policy processing is disabled by default but can be enabled by passing
the -policy' argument to the command line utilities or by calling the X509_VERIFY_PARAM_set1_policies()' function.
Common Weakness Enumeration (CWE)
Improper Certificate Validation
Uncontrolled Resource Consumption
NIST
3.9
CVSS SCORE
7.5highAlpine
-
Debian
-
Ubuntu
3.9
CVSS SCORE
7.5lowAlma
-
CVSS SCORE
N/AmediumAmazon
-
CVSS SCORE
N/AmediumAmazon
-
CVSS SCORE
N/AmediumAmazon
-
CVSS SCORE
N/AmediumAmazon
-
CVSS SCORE
N/AhighAmazon
-
CVSS SCORE
N/AmediumRed Hat
2.2
CVSS SCORE
5.9lowOracle
-
CVSS SCORE
N/AhighOracle
-
CVSS SCORE
N/AmediumChainguard
CGA-939c-98g8-vc74
-
Chainguard
CGA-c37v-v25g-6fpw
-
Chainguard
CGA-p76v-9mj6-p659
-
Chainguard
CGA-q4v5-8f5m-qr45
-
Chainguard
CGA-rm7q-7jfx-75fh
-
Chainguard
CGA-w8g4-mrf2-mxp4
-
Photon
CVE-2023-0464
-