CVE-2023-0466

Severity CVSS v4.0:
Pending analysis
Type:
CWE-295 Improper Certificate Validation
Publication date:
28/03/2023
Last modified:
19/02/2025

Description

The function X509_VERIFY_PARAM_add0_policy() is documented to<br /> implicitly enable the certificate policy check when doing certificate<br /> verification. However the implementation of the function does not<br /> enable the check which allows certificates with invalid or incorrect<br /> policies to pass the certificate verification.<br /> <br /> As suddenly enabling the policy check could break existing deployments it was<br /> decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy()<br /> function.<br /> <br /> Instead the applications that require OpenSSL to perform certificate<br /> policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly<br /> enable the policy check by calling X509_VERIFY_PARAM_set_flags() with<br /> the X509_V_FLAG_POLICY_CHECK flag argument.<br /> <br /> Certificate policy checks are disabled by default in OpenSSL and are not<br /> commonly used by applications.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 1.0.2 (including) 1.0.2zh (excluding)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 1.1.1 (including) 1.1.1u (excluding)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 3.0.0 (including) 3.0.9 (excluding)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 3.1.0 (including) 3.1.1 (excluding)


References to Advisories, Solutions, and Tools