First published: Wed May 17 2023(Updated: )
Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service.
Credit: openssl-security@openssl.org openssl-security@openssl.org openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openssl | 1.1.1w-0+deb11u1 1.1.1n-0+deb11u5 3.0.14-1~deb12u1 3.0.14-1~deb12u2 3.3.2-1 | |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 | |
OpenSSL libcrypto | >=1.0.2<1.0.2zh | |
OpenSSL libcrypto | >=1.1.1<1.1.1u | |
OpenSSL libcrypto | >=3.0.0<3.0.9 | |
OpenSSL libcrypto | >=3.1.0<3.1.1 | |
Debian GNU/Linux | =10.0 | |
Debian GNU/Linux | =11.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=17.0.0<=17.1.2 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=14.1.0<=14.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=13.1.0<=13.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=8.0.0<=8.3.0 | |
F5 F5OS-A | =1.8.0=1.7.0>=1.5.0<=1.5.2=1.4.0>=1.3.0<=1.3.2 | |
F5 F5OS-C | =1.8.0>=1.6.0<=1.6.2>=1.5.0<=1.5.1 | |
F5 Traffix Systems Signaling Delivery Controller | =5.2.0=5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2650 is a vulnerability that allows specially crafted ASN.1 object identifiers or data containing them to cause slow processing in OpenSSL.
Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF, or TS with no message size limit may experience slow performance.
CVE-2023-2650 has a severity rating of 6.5 (medium).
To fix CVE-2023-2650, upgrade OpenSSL to version 1.1.1u, 1.1.1n, or 3.0.9 or apply the necessary updates provided by your operating system vendor.
You can find more information about CVE-2023-2650 on the OpenSSL website and the official CVE entry.