Vulnerability Details : CVE-2023-0217
An invalid pointer dereference on read can be triggered when an
application tries to check a malformed DSA public key by the
EVP_PKEY_public_check() function. This will most likely lead
to an application crash. This function can be called on public
keys supplied from untrusted sources which could allow an attacker
to cause a denial of service attack.
The TLS implementation in OpenSSL does not call this function
but applications might call the function if there are additional
security requirements imposed by standards such as FIPS 140-3.
Vulnerability category: Denial of service
Products affected by CVE-2023-0217
- cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-0217
0.45%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 61 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-0217
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2023-0217
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-0217
-
https://www.openssl.org/news/secadv/20230207.txt
Vendor Advisory
-
https://security.gentoo.org/glsa/202402-08
OpenSSL: Multiple Vulnerabilities (GLSA 202402-08) — Gentoo security
-
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=23985bac83fd50c8e29431009302b5442f985096
git.openssl.org Git - openssl.git/commitdiff
Jump to