Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-1343
HistoryMay 03, 2022 - 12:00 a.m.

CVE-2022-1343

2022-05-0300:00:00
ubuntu.com
ubuntu.com
30

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

50.8%

The function OCSP_basic_verify verifies the signer certificate on an OCSP
response. In the case where the (non-default) flag OCSP_NOCHECKS is used
then the response will be positive (meaning a successful verification) even
in the case where the response signing certificate fails to verify. It is
anticipated that most users of OCSP_basic_verify will not use the
OCSP_NOCHECKS flag. In this case the OCSP_basic_verify function will
return a negative value (indicating a fatal error) in the case of a
certificate verification failure. The normal expected return value in this
case would be 0. This issue also impacts the command line OpenSSL β€œocsp”
application. When verifying an ocsp response with the β€œ-no_cert_checks”
option the command line application will report that the verification is
successful even though it has in fact failed. In this case the incorrect
successful response will also be accompanied by error messages showing the
failure and contradicting the apparently successful result. Fixed in
OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).

Notes

Author Note
mdeslaur OpenSSL v3.x only
OSVersionArchitecturePackageVersionFilename
ubuntu16.04noarchedk2<Β anyUNKNOWN
ubuntu22.04noarchopenssl<Β 3.0.2-0ubuntu1.1UNKNOWN
ubuntu22.10noarchopenssl<Β 3.0.2-0ubuntu2UNKNOWN
ubuntu23.04noarchopenssl<Β 3.0.2-0ubuntu2UNKNOWN
ubuntu23.10noarchopenssl<Β 3.0.2-0ubuntu2UNKNOWN

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

50.8%