Applications that use a non-default option when verifying certificates may be
vulnerable to an attack from a malicious CA to circumvent certain checks.
Invalid certificate policies in leaf certificates are silently ignored by
OpenSSL and other certificate policy checks are skipped for that certificate.
A malicious CA could use this to deliberately assert invalid certificate policies
in order to circumvent policy checking on the certificate altogether.
Policy processing is disabled by default but can be enabled by passing
the `-policy' argument to the command line utilities or by calling the
`X509_VERIFY_PARAM_set1_policies()' function.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: openssl
Published: 2023-03-28T14:30:39.707Z
Updated: 2024-08-02T05:10:56.368Z
Reserved: 2023-01-24T13:51:42.650Z
Link: CVE-2023-0465
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-03-28T15:15:06.820
Modified: 2024-11-21T07:37:13.930
Link: CVE-2023-0465
Redhat