HTTP: OpenSSL CRL Verification X.400 Address Handling Type Confusion Vulnerability

This signature detects attempts to exploit a known vulnerability against OpenSSL CRL Verification X.400 Address Handling. A successful attack can lead to sensitive information disclosure.

Extended Description

There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.

Affected Products

Stormshield stormshield_management_center

References

CVE: CVE-2023-0286

Short Name
HTTP:STC:CRL-TYPE-CNFSN
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Address CRL CVE-2023-0286 Confusion Handling OpenSSL Type Verification Vulnerability X.400
Release Date
03/29/2023
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3783
False Positive
Unknown
Vendors

Openssl

Stormshield

Found a potential security threat?