- Description
- There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.
- Source
- openssl-security@openssl.org
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 7.4
- Impact score
- 5.2
- Exploitability score
- 2.2
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
- Severity
- HIGH
- nvd@nist.gov
- CWE-843
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "70985D55-A574-4151-B451-4D500CBFC29A",
"versionEndExcluding": "1.0.2zg",
"versionStartIncluding": "1.0.2"
},
{
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DE0061D6-8F81-45D3-B254-82A94915FD08",
"versionEndExcluding": "1.1.1t",
"versionStartIncluding": "1.1.1"
},
{
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A6DC5D88-4E99-48F2-8892-610ACA9B5B86",
"versionEndExcluding": "3.0.8",
"versionStartIncluding": "3.0.0"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:stormshield:stormshield_management_center:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "62A933C5-C56E-485C-AD49-3B6A2C329131",
"versionEndExcluding": "3.3.3"
},
{
"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "27B77023-4983-4D33-9824-A120A5ED31BD",
"versionEndExcluding": "2.7.11",
"versionStartIncluding": "2.7.0"
},
{
"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8BD398C8-BC0B-4ED5-B71A-B9C6D8F63659",
"versionEndExcluding": "3.7.34",
"versionStartIncluding": "2.8.0"
},
{
"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "31B59634-B59C-4391-96D3-200A86A6CE3E",
"versionEndExcluding": "3.11.22",
"versionStartIncluding": "3.8.0"
},
{
"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F7794B42-8235-4C75-866F-5D0A405F0989",
"versionEndExcluding": "4.3.16",
"versionStartIncluding": "4.0.0"
},
{
"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C8A23A5D-928A-4225-9C93-31E5DFE215A7",
"versionEndExcluding": "4.6.3",
"versionStartIncluding": "4.4.0"
}
],
"operator": "OR"
}
]
}
]