| Summary | The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j). |
|---|---|
| Publication Date | March 26, 2021, 12:15 a.m. |
| Registration Date | March 26, 2021, 10:04 a.m. |
| Last Update | Nov. 21, 2024, 3:21 p.m. |
| CVSS3.1 : HIGH | |
| スコア | 7.4 |
|---|---|
| Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 高 |
| 攻撃に必要な特権レベル(PR) | 不要 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | なし |
| CVSS2.0 : MEDIUM | |
| Score | 5.8 |
|---|---|
| Vector | AV:N/AC:M/Au:N/C:P/I:P/A:N |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 中 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 低 |
| 完全性への影響(I) | 低 |
| 可用性への影響(A) | なし |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 1.1.1h | 1.1.1k | |||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:freebsd:freebsd:12.2:p1:*:*:*:*:*:* | |||||
| cpe:2.3:o:freebsd:freebsd:12.2:p2:*:*:*:*:*:* | |||||
| cpe:2.3:o:freebsd:freebsd:12.2:-:*:*:*:*:*:* | |||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:santricity_smi-s_provider_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:* | ||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:storagegrid_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:storagegrid:-:*:*:*:*:*:*:* | ||||
| Configuration5 | or higher | or less | more than | less than | |
| cpe:2.3:o:windriver:linux:-:*:*:*:cd:*:*:* | |||||
| cpe:2.3:o:windriver:linux:18.0:*:*:*:lts:*:*:* | |||||
| cpe:2.3:o:windriver:linux:19.0:*:*:*:lts:*:*:* | |||||
| cpe:2.3:o:windriver:linux:17.0:*:*:*:lts:*:*:* | |||||
| Configuration6 | or higher | or less | more than | less than | |
| cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:netapp:cloud_volumes_ontap_mediator:-:*:*:*:*:*:*:* | |||||
| Configuration7 | or higher | or less | more than | less than | |
| cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* | |||||
| Configuration8 | or higher | or less | more than | less than | |
| cpe:2.3:a:tenable:nessus_agent:*:*:*:*:*:*:*:* | 8.2.1 | 8.2.3 | |||
| cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:* | 8.13.1 | ||||
| cpe:2.3:a:tenable:nessus_network_monitor:5.11.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:tenable:nessus_network_monitor:5.12.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:tenable:nessus_network_monitor:5.12.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:tenable:nessus_network_monitor:5.13.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:tenable:nessus_network_monitor:5.11.0:*:*:*:*:*:*:* | |||||
| Configuration9 | or higher | or less | more than | less than | |
| cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:enterprise_manager_for_storage_management:13.4.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:secure_global_desktop:5.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:graalvm:20.3.1.2:*:*:*:enterprise:*:*:* | |||||
| cpe:2.3:a:oracle:graalvm:21.0.0.2:*:*:*:enterprise:*:*:* | |||||
| cpe:2.3:a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:* | |||||
| cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:* | 8.0.15 | 8.0.23 | |||
| cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:* | 5.7.33 | ||||
| cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:* | 8.0.23 | ||||
| cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:* | 8.0.23 | ||||
| cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:* | 9.2.6.0 | ||||
| cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:* | 8.0.23 | ||||
| cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:* | 18.1.0.1.0 | ||||
| cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:*:*:*:*:*:*:*:* | 8.57 | 8.59 | |||
| Configuration10 | or higher | or less | more than | less than | |
| cpe:2.3:a:mcafee:web_gateway_cloud_service:10.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:mcafee:web_gateway_cloud_service:9.2.10:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:mcafee:web_gateway_cloud_service:8.2.19:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:mcafee:web_gateway:10.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:mcafee:web_gateway:9.2.10:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:mcafee:web_gateway:8.2.19:*:*:*:*:*:*:* | |||||
| Configuration11 | or higher | or less | more than | less than | |
| cpe:2.3:o:sonicwall:sma100_firmware:*:*:*:*:*:*:*:* | 10.2.1.0-17sv | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:sonicwall:sma100:-:*:*:*:*:*:*:* | ||||
| Configuration12 | or higher | or less | more than | less than | |
| cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:* | 7.0.1-r1456 | ||||
| cpe:2.3:a:sonicwall:email_security:*:*:*:*:*:*:*:* | 10.0.11 | ||||
| cpe:2.3:a:sonicwall:capture_client:*:*:*:*:*:*:*:* | 3.6.24 | ||||
| Configuration13 | or higher | or less | more than | less than | |
| cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* | 15.0.0 | 15.14.0 | |||
| cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* | 14.0.0 | 14.16.1 | |||
| cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* | 12.0.0 | 12.22.1 | |||
| cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* | 10.0.0 | 10.24.1 | |||
| Title | OpenSSL における CA 以外の証明書が他の証明書を発行できないチェックを回避される脆弱性 |
|---|---|
| Summary | OpenSSL には、CA 以外の証明書が他の証明書を発行できないチェックを回避される脆弱性が存在します。 |
| Possible impacts | CA 以外の証明書が他の証明書を発行できないチェックを回避される可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | March 25, 2021, midnight |
| Registration Date | May 6, 2021, 5:03 p.m. |
| Last Update | May 24, 2021, 5:25 p.m. |
| OpenSSL Project |
| OpenSSL 1.1.1h から 1.1.1j |
| 日立 |
| Hitachi Ops Center Analyzer viewpoint (海外販売のみ) |
| Hitachi Ops Center Common Services (海外販売のみ) |
| FreeBSD |
| FreeBSD |
| Fedora Project |
| Fedora |
| NetApp |
| Cloud Volumes ONTAP メディエータ |
| OnCommand Workflow Automation |
| ONTAP Select Deploy administration utility |
| SANtricity SMI-S Provider ファームウェア |
| StorageGRID |
| StorageGRID ファームウェア |
| ウインドリバー株式会社 |
| Linux |
| Tenable, Inc. |
| Nessus |
| Nessus Agent |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2021年05月06日] 掲載 |
May 6, 2021, 5:03 p.m. |
| 2 | [2021年05月24日] 影響を受けるシステム:内容を更新 ベンダ情報:Hitachi Software Vulnerability Information (hitachi-sec-2021-117) を追加 ベンダ情報:Hitachi Software Vulnerability Information (hitachi-sec-2021-119) を追加 ベンダ情報:ソフトウェア製品セキュリティ情報 (hitachi-sec-2021-117) を追加 ベンダ情報:ソフトウェア製品セキュリティ情報 (hitachi-sec-2021-119) を追加 |
May 24, 2021, 2:34 p.m. |