First published: Wed May 17 2023(Updated: )
Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service.
Credit: openssl-security@openssl.org openssl-security@openssl.org openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL OpenSSL | >=1.0.2<1.0.2zh | |
OpenSSL OpenSSL | >=1.1.1<1.1.1u | |
OpenSSL OpenSSL | >=3.0.0<3.0.9 | |
OpenSSL OpenSSL | >=3.1.0<3.1.1 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/openssl | 1.1.1w-0+deb11u1 1.1.1n-0+deb11u5 3.0.14-1~deb12u1 3.0.14-1~deb12u2 3.3.2-1 | |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2650 is a vulnerability that allows specially crafted ASN.1 object identifiers or data containing them to cause slow processing in OpenSSL.
Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF, or TS with no message size limit may experience slow performance.
CVE-2023-2650 has a severity rating of 6.5 (medium).
To fix CVE-2023-2650, upgrade OpenSSL to version 1.1.1u, 1.1.1n, or 3.0.9 or apply the necessary updates provided by your operating system vendor.
You can find more information about CVE-2023-2650 on the OpenSSL website and the official CVE entry.