CVE-2023-2975
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
14/07/2023
Última modificación:
23/04/2025
Descripción
*** Pendiente de traducción *** Issue summary: The AES-SIV cipher implementation contains a bug that causes<br />
it to ignore empty associated data entries which are unauthenticated as<br />
a consequence.<br />
<br />
Impact summary: Applications that use the AES-SIV algorithm and want to<br />
authenticate empty data entries as associated data can be misled by removing,<br />
adding or reordering such empty entries as these are ignored by the OpenSSL<br />
implementation. We are currently unaware of any such applications.<br />
<br />
The AES-SIV algorithm allows for authentication of multiple associated<br />
data entries along with the encryption. To authenticate empty data the<br />
application has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with<br />
NULL pointer as the output buffer and 0 as the input buffer length.<br />
The AES-SIV implementation in OpenSSL just returns success for such a call<br />
instead of performing the associated data authentication operation.<br />
The empty data thus will not be authenticated.<br />
<br />
As this issue does not affect non-empty associated data authentication and<br />
we expect it to be rare for an application to use empty associated data<br />
entries this is qualified as Low severity issue.
Impacto
Puntuación base 3.x
5.30
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.0.0 (incluyendo) | 3.0.9 (incluyendo) |
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.1.0 (incluyendo) | 3.1.1 (incluyendo) |
| cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba%3Dcommitdiff%3Bh%3D00e2f5eea29994d19293ec4e8c8775ba73678598
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba%3Dcommitdiff%3Bh%3D6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc
- https://www.openssl.org/news/secadv/20230714.txt
- http://www.openwall.com/lists/oss-security/2023/07/15/1
- http://www.openwall.com/lists/oss-security/2023/07/19/5
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba%3Dcommitdiff%3Bh%3D00e2f5eea29994d19293ec4e8c8775ba73678598
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba%3Dcommitdiff%3Bh%3D6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc
- https://security.gentoo.org/glsa/202402-08
- https://security.netapp.com/advisory/ntap-20230725-0004/
- https://www.openssl.org/news/secadv/20230714.txt



