First published: Tue Mar 28 2023(Updated: )
Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.
Credit: openssl-security@openssl.org openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL OpenSSL | >=1.0.2<1.0.2zh | |
OpenSSL OpenSSL | >=1.1.1<1.1.1u | |
OpenSSL OpenSSL | >=3.0.0<3.0.9 | |
OpenSSL OpenSSL | >=3.1.0<3.1.1 | |
debian/openssl | <=1.1.1n-0+deb10u3 | 1.1.1n-0+deb10u6 1.1.1w-0+deb11u1 1.1.1n-0+deb11u5 3.0.11-1~deb12u2 3.1.4-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0465 is a vulnerability that affects applications using a non-default option when verifying certificates, making them vulnerable to attacks from malicious certificate authorities.
CVE-2023-0465 affects OpenSSL by allowing invalid certificate policies in leaf certificates to be silently ignored and certain certificate policy checks to be skipped.
OpenSSL versions 1.1.1n-0+deb10u3 to 1.1.1n-0+deb10u6, 1.1.1n-0+deb11u4 to 1.1.1n-0+deb11u5, 3.0.9-1 to 3.0.11-1 are affected by CVE-2023-0465.
To fix CVE-2023-0465 in OpenSSL, update to version 1.1.1n-0+deb10u6 or higher for Debian 10, and version 1.1.1n-0+deb11u5 or higher for Debian 11.
You can find more information about CVE-2023-0465 on the OpenSSL security advisory at https://www.openssl.org/news/secadv/20230328.txt and the associated commits in the OpenSSL Git repository.