Description
An invalid pointer dereference on read can be triggered when an
application tries to load malformed PKCS7 data with the
d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions.

The result of the dereference is an application crash which could
lead to a denial of service attack. The TLS implementation in OpenSSL
does not call this function however third party applications might
call these functions on untrusted data.
Published: 2023-02-08
Score: 7.5 High
EPSS: 1.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-29xx-hcv2-c4cp openssl-src subject to Invalid pointer dereference in `d2i_PKCS7` functions
Ubuntu USN Ubuntu USN USN-5844-1 OpenSSL vulnerabilities
History

Tue, 04 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
References

Mon, 05 May 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 13 Feb 2025 16:45:00 +0000

Type Values Removed Values Added
Description An invalid pointer dereference on read can be triggered when an application tries to load malformed PKCS7 data with the d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions. The result of the dereference is an application crash which could lead to a denial of service attack. The TLS implementation in OpenSSL does not call this function however third party applications might call these functions on untrusted data. An invalid pointer dereference on read can be triggered when an application tries to load malformed PKCS7 data with the d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions. The result of the dereference is an application crash which could lead to a denial of service attack. The TLS implementation in OpenSSL does not call this function however third party applications might call these functions on untrusted data.

Subscriptions

Openssl Openssl
Redhat Enterprise Linux Rhel Eus
Stormshield Stormshield Management Center
cve-icon MITRE

Status: PUBLISHED

Assigner: openssl

Published:

Updated: 2025-11-04T19:14:34.082Z

Reserved: 2023-01-11T12:01:06.675Z

Link: CVE-2023-0216

cve-icon Vulnrichment

Updated: 2025-11-04T19:14:34.082Z

cve-icon NVD

Status : Modified

Published: 2023-02-08T20:15:24.160

Modified: 2025-11-04T20:16:16.043

Link: CVE-2023-0216

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-02-07T00:00:00Z

Links: CVE-2023-0216 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses