中危 OpenSSL 安全漏洞
CVE编号
CVE-2023-0215利用情况
暂无补丁情况
官方补丁披露时间
2023-02-07漏洞描述
A use-after-free vulnerability was found in OpenSSL's BIO_new_NDEF function. The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally by OpenSSL to support the SMIME, CMS, and PKCS7 streaming capabilities, but it may also be called directly by end-user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions. For example, if a CMS recipient public key is invalid, the new filter BIO is freed, and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up, and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then calls BIO_pop() on the BIO, a use-after-free will occur, possibly resulting in a crash.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | openssl | openssl | * | From (including) 1.0.2 | Up to (excluding) 1.0.2zg | ||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | * | From (including) 1.1.1 | Up to (excluding) 1.1.1t | ||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | * | From (including) 3.0.0 | Up to (excluding) 3.0.8 | ||||
运行在以下环境 | |||||||||
系统 | alpine_3.14 | openssl | * | Up to (excluding) 1.1.1t-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.15 | openssl | * | Up to (excluding) 3.0.8-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.16 | openssl | * | Up to (excluding) 3.0.8-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.17 | openssl | * | Up to (excluding) 1.1.1t-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.18 | openssl | * | Up to (excluding) 1.1.1t-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_edge | openssl | * | Up to (excluding) 3.0.8-r0 | |||||
运行在以下环境 | |||||||||
系统 | amazon_2 | openssl | * | Up to (excluding) 1.0.2k-24.amzn2.0.7 | |||||
运行在以下环境 | |||||||||
系统 | amazon_2023 | openssl | * | Up to (excluding) 3.0.5-1.amzn2023.0.6 | |||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | openssl | * | Up to (excluding) 1.0.2k-16.162.amzn1 | |||||
运行在以下环境 | |||||||||
系统 | anolis_os_8 | edk2-ovmf | * | Up to (excluding) 1.1.1k-9.0.1 | |||||
运行在以下环境 | |||||||||
系统 | centos_8 | edk2-ovmf | * | Up to (excluding) 1.1.1k-9.el8_7 | |||||
运行在以下环境 | |||||||||
系统 | debian_10 | openssl | * | Up to (excluding) 1.1.1n-0+deb10u4 | |||||
运行在以下环境 | |||||||||
系统 | debian_11 | openssl | * | Up to (excluding) 1.1.1n-0+deb11u4 | |||||
运行在以下环境 | |||||||||
系统 | debian_12 | openssl | * | Up to (excluding) 3.0.8-1 | |||||
运行在以下环境 | |||||||||
系统 | debian_sid | openssl | * | Up to (excluding) 3.0.8-1 | |||||
运行在以下环境 | |||||||||
系统 | fedora_36 | openssl-devel | * | Up to (excluding) 20221117gitfff6d81270b5-14.fc36 | |||||
运行在以下环境 | |||||||||
系统 | fedora_37 | openssl-devel | * | Up to (excluding) 20221117gitfff6d81270b5-13.fc37 | |||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_7 | openssl11-libs | * | Up to (excluding) 1.1.1k-5.el7 | |||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_8 | openssl3-devel | * | Up to (excluding) 3.0.7-5.el8.1 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10 | openssl | * | Up to (excluding) 1.1.1f-15.p07.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10SP1 | openssl | * | Up to (excluding) 202011-7.p02.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10SP2 | openssl | * | Up to (excluding) 202011-7.p02.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10SP3 | openssl | * | Up to (excluding) 202002-8.p05.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_loongarch64_V10SP1 | openssl | * | Up to (excluding) 1.1.1f-4.p10.a.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_loongarch64_V10SP3 | openssl | * | Up to (excluding) 1.1.1f-15.p07.a.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10 | openssl | * | Up to (excluding) 1.1.1f-15.p07.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10SP1 | openssl | * | Up to (excluding) 202011-7.p02.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10SP2 | openssl | * | Up to (excluding) 202011-7.p02.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10SP3 | openssl | * | Up to (excluding) 202002-8.p05.ky10 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_5.2 | libopenssl-1_1-devel | * | Up to (excluding) 1.1.1d-150200.11.57.1 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_5.3 | libopenssl-1_1-devel | * | Up to (excluding) 1.1.1l-150400.7.22.1 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.4 | libopenssl-3-devel-32bit | * | Up to (excluding) 1.0.2p-150000.3.65.1 | |||||
运行在以下环境 | |||||||||
系统 | oracle_8 | oraclelinux-release | * | Up to (excluding) 1.1.1k-9.ksplice1.el8_7 | |||||
运行在以下环境 | |||||||||
系统 | oracle_9 | oraclelinux-release | * | Up to (excluding) 20221207gitfff6d81270b5-9.el9_2 | |||||
运行在以下环境 | |||||||||
系统 | redhat_8 | edk2-ovmf | * | Up to (excluding) 1.1.1k-9.el8_7 | |||||
运行在以下环境 | |||||||||
系统 | redhat_9 | edk2-ovmf | * | Up to (excluding) 3.0.1-47.el9_1 | |||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | libopenssl1_1 | * | Up to (excluding) 1.0.2p-3.64.1 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04 | openssl1.0 | * | Up to (excluding) 1.0.2n-1ubuntu5.11 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_20.04 | openssl | * | Up to (excluding) 1.1.1f-1ubuntu2.17 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_22.04 | nodejs | * | Up to (excluding) 3.0.2-0ubuntu1.8 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_22.10 | openssl | * | Up to (excluding) 3.0.5-2ubuntu2.1 | |||||
运行在以下环境 | |||||||||
系统 | unionos_a | openssl | * | Up to (excluding) openssl-1.1.1k-9.uelc20.04 | |||||
运行在以下环境 | |||||||||
系统 | unionos_e | nodejs | * | Up to (excluding) openssl-1.1.1f-22.up2.uel20 | |||||
- 攻击路径 本地
- 攻击复杂度 困难
- 权限要求 普通权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 N/A
CWE-ID | 漏洞类型 |
CWE-416 | 释放后使用 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论