Lucene search

K
nvd[email protected]NVD:CVE-2021-3450
HistoryMar 25, 2021 - 3:15 p.m.

CVE-2021-3450

2021-03-2515:15:13
CWE-295
web.nvd.nist.gov
8
x509_v_flag_x509_strict
openssl
certificate chain
security checks

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS

0.002

Percentile

61.4%

The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a “purpose” has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named “purpose” values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).

Affected configurations

Nvd
Node
opensslopensslRange1.1.1h1.1.1k
Node
freebsdfreebsdMatch12.2-
OR
freebsdfreebsdMatch12.2p1
OR
freebsdfreebsdMatch12.2p2
Node
netappsantricity_smi-s_provider_firmwareMatch-
AND
netappsantricity_smi-s_providerMatch-
Node
netappstoragegrid_firmwareMatch-
AND
netappstoragegridMatch-
Node
windriverlinuxMatch-cd
OR
windriverlinuxMatch17.0lts
OR
windriverlinuxMatch18.0lts
OR
windriverlinuxMatch19.0lts
Node
netappcloud_volumes_ontap_mediatorMatch-
OR
netapponcommand_workflow_automationMatch-
OR
netappontap_select_deploy_administration_utilityMatch-
OR
netappstoragegridMatch-
Node
fedoraprojectfedoraMatch34
Node
tenablenessusRange8.13.1
OR
tenablenessus_agentRange8.2.18.2.3
OR
tenablenessus_network_monitorMatch5.11.0
OR
tenablenessus_network_monitorMatch5.11.1
OR
tenablenessus_network_monitorMatch5.12.0
OR
tenablenessus_network_monitorMatch5.12.1
OR
tenablenessus_network_monitorMatch5.13.0
Node
oraclecommerce_guided_searchMatch11.3.2
OR
oracleenterprise_manager_for_storage_managementMatch13.4.0.0
OR
oraclegraalvmMatch19.3.5enterprise
OR
oraclegraalvmMatch20.3.1.2enterprise
OR
oraclegraalvmMatch21.0.0.2enterprise
OR
oraclejd_edwards_enterpriseone_toolsRange<9.2.6.0
OR
oraclejd_edwards_world_securityMatcha9.4
OR
oraclemysql_connectorsRange8.0.23
OR
oraclemysql_enterprise_monitorRange8.0.23
OR
oraclemysql_serverRange5.7.33
OR
oraclemysql_serverRange8.0.158.0.23
OR
oraclemysql_workbenchRange8.0.23
OR
oraclepeoplesoft_enterprise_peopletoolsRange8.578.59
OR
oraclesecure_backupRange<18.1.0.1.0
OR
oraclesecure_global_desktopMatch5.6
OR
oracleweblogic_serverMatch12.2.1.4.0
OR
oracleweblogic_serverMatch14.1.1.0.0
Node
mcafeeweb_gatewayMatch8.2.19
OR
mcafeeweb_gatewayMatch9.2.10
OR
mcafeeweb_gatewayMatch10.1.1
OR
mcafeeweb_gateway_cloud_serviceMatch8.2.19
OR
mcafeeweb_gateway_cloud_serviceMatch9.2.10
OR
mcafeeweb_gateway_cloud_serviceMatch10.1.1
Node
sonicwallsma100_firmwareRange<10.2.1.0-17sv
AND
sonicwallsma100Match-
Node
sonicwallcapture_clientRange<3.6.24
OR
sonicwallemail_securityRange<10.0.11
OR
sonicwallsonicosRange7.0.1-r1456
Node
nodejsnode.jsRange10.0.010.24.1-
OR
nodejsnode.jsRange12.0.012.22.1-
OR
nodejsnode.jsRange14.0.014.16.1-
OR
nodejsnode.jsRange15.0.015.14.0-
VendorProductVersionCPE
opensslopenssl*cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
freebsdfreebsd12.2cpe:2.3:o:freebsd:freebsd:12.2:-:*:*:*:*:*:*
freebsdfreebsd12.2cpe:2.3:o:freebsd:freebsd:12.2:p1:*:*:*:*:*:*
freebsdfreebsd12.2cpe:2.3:o:freebsd:freebsd:12.2:p2:*:*:*:*:*:*
netappsantricity_smi-s_provider_firmware-cpe:2.3:o:netapp:santricity_smi-s_provider_firmware:-:*:*:*:*:*:*:*
netappsantricity_smi-s_provider-cpe:2.3:h:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:*
netappstoragegrid_firmware-cpe:2.3:o:netapp:storagegrid_firmware:-:*:*:*:*:*:*:*
netappstoragegrid-cpe:2.3:h:netapp:storagegrid:-:*:*:*:*:*:*:*
windriverlinux-cpe:2.3:o:windriver:linux:-:*:*:*:cd:*:*:*
windriverlinux17.0cpe:2.3:o:windriver:linux:17.0:*:*:*:lts:*:*:*
Rows per page:
1-10 of 521

References

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS

0.002

Percentile

61.4%