An invalid pointer dereference on read can be triggered when an
application tries to load malformed PKCS7 data with the
d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions.
The result of the dereference is an application crash which could
lead to a denial of service attack. The TLS implementation in OpenSSL
does not call this function however third party applications might
call these functions on untrusted data.
References
Link | Resource |
---|---|
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=934a04f0e775309cadbef0aa6b9692e1b12a76c6 | Patch Vendor Advisory |
https://security.gentoo.org/glsa/202402-08 | |
https://www.openssl.org/news/secadv/20230207.txt | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: openssl
Published: 2023-02-08T19:03:05.652Z
Updated: 2023-02-24T14:44:35.753Z
Reserved: 2023-01-11T12:01:06.675Z
Link: CVE-2023-0216
JSON object: View
NVD Information
Status : Modified
Published: 2023-02-08T20:15:24.160
Modified: 2024-02-04T09:15:08.947
Link: CVE-2023-0216
JSON object: View
Redhat Information
No data.
CWE