CVE-2023-0217
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
08/02/2023
Last modified:
04/11/2025
Description
An invalid pointer dereference on read can be triggered when an<br />
application tries to check a malformed DSA public key by the<br />
EVP_PKEY_public_check() function. This will most likely lead<br />
to an application crash. This function can be called on public<br />
keys supplied from untrusted sources which could allow an attacker<br />
to cause a denial of service attack.<br />
<br />
The TLS implementation in OpenSSL does not call this function<br />
but applications might call the function if there are additional<br />
security requirements imposed by standards such as FIPS 140-3.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.0.0 (including) | 3.0.7 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba%3Dcommitdiff%3Bh%3D23985bac83fd50c8e29431009302b5442f985096
- https://security.gentoo.org/glsa/202402-08
- https://www.openssl.org/news/secadv/20230207.txt
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba%3Dcommitdiff%3Bh%3D23985bac83fd50c8e29431009302b5442f985096
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0003
- https://security.gentoo.org/glsa/202402-08
- https://www.openssl.org/news/secadv/20230207.txt



