Applications that use a non-default option when verifying certificates may be
vulnerable to an attack from a malicious CA to circumvent certain checks.
Invalid certificate policies in leaf certificates are silently ignored by
OpenSSL and other certificate policy checks are skipped for that certificate.
A malicious CA could use this to deliberately assert invalid certificate policies
in order to circumvent policy checking on the certificate altogether.
Policy processing is disabled by default but can be enabled by passing
the `-policy' argument to the command line utilities or by calling the
`X509_VERIFY_PARAM_set1_policies()' function.
Metrics
Affected Vendors & Products
References
History
Tue, 18 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: openssl
Published:
Updated: 2025-02-18T20:12:50.266Z
Reserved: 2023-01-24T13:51:42.650Z
Link: CVE-2023-0465

Updated: 2024-08-02T05:10:56.368Z

Status : Modified
Published: 2023-03-28T15:15:06.820
Modified: 2025-02-18T21:15:13.877
Link: CVE-2023-0465
