X.400 address type confusion in X.509 GeneralName
Description
There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING.
When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Type confusion in OpenSSL's X.400 address processing can allow attackers to read memory or cause denial of service when CRL checking is enabled.
Vulnerability
OpenSSL contains a type confusion vulnerability in the parsing of X.400 addresses within X.509 GeneralNames [1][2]. The x400Address field was defined as ASN1_TYPE in the public structure, but it is actually parsed as an ASN1_STRING. This mismatch leads to the GENERAL_NAME_cmp function misinterpreting the data [3].
Exploitation
The attack requires CRL checking to be enabled (the X509_V_FLAG_CRL_CHECK flag) [1]. An attacker can supply both a crafted certificate chain and a CRL, neither needing a valid signature, to pass arbitrary pointers to a memcmp call [2]. In scenarios where only one input is controlled, the other must already contain an X.400 address as a CRL distribution point, which is uncommon [3].
Impact
Successful exploitation can lead to memory disclosure or denial of service (DoS) [1]. The vulnerability is rated High severity and affects OpenSSL versions 3.0, 1.1.1, and 1.0.2 [3].
Mitigation
OpenSSL has released fixed versions: 3.0.8, 1.1.1t, and 1.0.2zg (for premium support customers) [3]. Users should upgrade immediately. The issue was reported by David Benjamin (Google) on January 11, 2023 [3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
cryptographyPyPI | >= 0.8.1, < 39.0.1 | 39.0.1 |
openssl-srccrates.io | < 111.25.0 | 111.25.0 |
openssl-srccrates.io | >= 300.0.0, < 300.0.12 | 300.0.12 |
Affected products
97- osv-coords96 versionspkg:apk/chainguard/libcrypto3pkg:apk/chainguard/libssl3pkg:apk/chainguard/mitmproxypkg:apk/chainguard/opensslpkg:apk/chainguard/openssl-devpkg:apk/chainguard/openssl-docpkg:apk/chainguard/openssl-engine-afalgpkg:apk/chainguard/openssl-engine-capipkg:apk/chainguard/openssl-engine-loader-atticpkg:apk/chainguard/openssl-engine-padlockpkg:apk/chainguard/openssl-provider-fipspkg:apk/chainguard/openssl-provider-legacypkg:apk/chainguard/ruby-3.1pkg:apk/chainguard/ruby-3.1-devpkg:apk/chainguard/ruby-3.1-docpkg:apk/wolfi/libcrypto3pkg:apk/wolfi/libssl3pkg:apk/wolfi/mitmproxypkg:apk/wolfi/opensslpkg:apk/wolfi/openssl-devpkg:apk/wolfi/openssl-docpkg:apk/wolfi/openssl-engine-afalgpkg:apk/wolfi/openssl-engine-capipkg:apk/wolfi/openssl-engine-loader-atticpkg:apk/wolfi/openssl-engine-padlockpkg:apk/wolfi/openssl-provider-legacypkg:apk/wolfi/ruby-3.1pkg:apk/wolfi/ruby-3.1-devpkg:apk/wolfi/ruby-3.1-docpkg:cargo/openssl-srcpkg:pypi/cryptographypkg:rpm/almalinux/compat-openssl10pkg:rpm/almalinux/compat-openssl11pkg:rpm/almalinux/edk2-aarch64pkg:rpm/almalinux/edk2-ovmfpkg:rpm/almalinux/edk2-toolspkg:rpm/almalinux/edk2-tools-docpkg:rpm/almalinux/opensslpkg:rpm/almalinux/openssl-develpkg:rpm/almalinux/openssl-libspkg:rpm/almalinux/openssl-perlpkg:rpm/opensuse/openssl-1_0_0&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/openssl-1_1&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/openssl-1_1&distro=openSUSE%20Leap%20Micro%205.2pkg:rpm/opensuse/openssl-1_1&distro=openSUSE%20Leap%20Micro%205.3pkg:rpm/opensuse/openssl-1_1-livepatches&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/openssl-3&distro=openSUSE%20Leap%2015.4pkg:rpm/suse/openssl-1_0_0&distro=SUSE%20Enterprise%20Storage%207pkg:rpm/suse/openssl-1_0_0&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/openssl-1_0_0&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-ESPOSpkg:rpm/suse/openssl-1_0_0&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/openssl-1_0_0&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP4pkg:rpm/suse/openssl-1_0_0&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/openssl-1_0_0&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/openssl-1_0_0&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/openssl-1_0_0&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/openssl-1_0_0&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/openssl-1_0_0&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/openssl-1_0_0&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/openssl-1_0_0&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/openssl-1_0_0&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/openssl-1_0_0&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/openssl-1_0_0&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/openssl-1_0_0&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/openssl-1_0_0&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209pkg:rpm/suse/openssl-1_1&distro=SUSE%20Enterprise%20Storage%207pkg:rpm/suse/openssl-1_1&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-ESPOSpkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Micro%205.3pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2015%20SP3pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/openssl-1_1&distro=SUSE%20Manager%20Proxy%204.2pkg:rpm/suse/openssl-1_1&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.2pkg:rpm/suse/openssl-1_1&distro=SUSE%20Manager%20Server%204.2pkg:rpm/suse/openssl-1_1&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/openssl-1_1&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209pkg:rpm/suse/openssl-1_1-livepatches&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP4pkg:rpm/suse/openssl1&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20COREpkg:rpm/suse/openssl-3&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/openssl&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL
< 3.1.0-r0+ 95 more
- (no CPE)range: < 3.1.0-r0
- (no CPE)range: < 3.1.0-r0
- (no CPE)range: < 12.2.1-r0
- (no CPE)range: < 3.1.0-r0
- (no CPE)range: < 3.1.0-r0
- (no CPE)range: < 3.1.0-r0
- (no CPE)range: < 3.1.0-r0
- (no CPE)range: < 3.1.0-r0
- (no CPE)range: < 3.1.0-r0
- (no CPE)range: < 3.1.0-r0
- (no CPE)range: < 3.0.8-r0
- (no CPE)range: < 3.1.0-r0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 3.1.0-r0
- (no CPE)range: < 3.1.0-r0
- (no CPE)range: < 12.2.1-r0
- (no CPE)range: < 3.1.0-r0
- (no CPE)range: < 3.1.0-r0
- (no CPE)range: < 3.1.0-r0
- (no CPE)range: < 3.1.0-r0
- (no CPE)range: < 3.1.0-r0
- (no CPE)range: < 3.1.0-r0
- (no CPE)range: < 3.1.0-r0
- (no CPE)range: < 3.1.0-r0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 111.25.0
- (no CPE)range: >= 0.8.1, < 39.0.1
- (no CPE)range: < 1:1.0.2o-4.el8_10.1
- (no CPE)range: < 1:1.1.1k-5.el9_6.1
- (no CPE)range: < 20221207gitfff6d81270b5-9.el9_2
- (no CPE)range: < 20221207gitfff6d81270b5-9.el9_2
- (no CPE)range: < 20221207gitfff6d81270b5-9.el9_2
- (no CPE)range: < 20221207gitfff6d81270b5-9.el9_2
- (no CPE)range: < 1:3.0.1-47.el9_1
- (no CPE)range: < 1:3.0.1-47.el9_1
- (no CPE)range: < 1:3.0.1-47.el9_1
- (no CPE)range: < 1:3.0.1-47.el9_1
- (no CPE)range: < 1.0.2p-150000.3.65.1
- (no CPE)range: < 1.1.1l-150400.7.22.1
- (no CPE)range: < 1.1.1d-150200.11.57.1
- (no CPE)range: < 1.1.1l-150400.7.22.1
- (no CPE)range: < 0.1-150400.3.3.1
- (no CPE)range: < 3.0.1-150400.4.17.1
- (no CPE)range: < 1.0.2p-150000.3.65.1
- (no CPE)range: < 1.0.2p-150000.3.65.1
- (no CPE)range: < 1.0.2p-150000.3.65.1
- (no CPE)range: < 1.0.2p-150000.3.65.1
- (no CPE)range: < 1.0.2p-150000.3.65.1
- (no CPE)range: < 1.0.2p-3.64.1
- (no CPE)range: < 1.0.2p-3.64.1
- (no CPE)range: < 1.0.2p-150000.3.65.1
- (no CPE)range: < 1.0.2p-150000.3.65.1
- (no CPE)range: < 1.0.2p-150000.3.65.1
- (no CPE)range: < 1.0.2p-3.64.1
- (no CPE)range: < 1.0.2p-3.64.1
- (no CPE)range: < 1.0.2p-150000.3.65.1
- (no CPE)range: < 1.0.2p-150000.3.65.1
- (no CPE)range: < 1.0.2p-150000.3.65.1
- (no CPE)range: < 1.0.2p-3.64.1
- (no CPE)range: < 1.0.2p-3.64.1
- (no CPE)range: < 1.0.2p-3.64.1
- (no CPE)range: < 1.1.1d-150200.11.57.1
- (no CPE)range: < 1.1.1d-150200.11.57.1
- (no CPE)range: < 1.1.0i-150100.14.42.1
- (no CPE)range: < 1.1.1d-150200.11.57.1
- (no CPE)range: < 1.1.1d-150200.11.57.1
- (no CPE)range: < 1.1.1d-150200.11.57.1
- (no CPE)range: < 1.1.1d-150200.11.57.1
- (no CPE)range: < 1.1.1d-150200.11.57.1
- (no CPE)range: < 1.1.1l-150400.7.22.1
- (no CPE)range: < 1.1.1l-150400.7.22.1
- (no CPE)range: < 1.1.1d-150200.11.57.1
- (no CPE)range: < 1.1.1d-2.75.1
- (no CPE)range: < 1.1.1d-2.75.1
- (no CPE)range: < 1.1.0i-150100.14.42.1
- (no CPE)range: < 1.1.1d-150200.11.57.1
- (no CPE)range: < 1.1.1d-150200.11.57.1
- (no CPE)range: < 1.1.1d-2.75.1
- (no CPE)range: < 1.1.1d-2.75.1
- (no CPE)range: < 1.1.0i-150100.14.42.1
- (no CPE)range: < 1.1.1d-150200.11.57.1
- (no CPE)range: < 1.1.1d-150200.11.57.1
- (no CPE)range: < 1.1.1d-2.75.1
- (no CPE)range: < 1.1.1d-150200.11.57.1
- (no CPE)range: < 1.1.1d-150200.11.57.1
- (no CPE)range: < 1.1.1d-150200.11.57.1
- (no CPE)range: < 1.1.1d-2.75.1
- (no CPE)range: < 1.1.1d-2.75.1
- (no CPE)range: < 0.1-150400.3.3.1
- (no CPE)range: < 1.0.1g-0.58.56.1
- (no CPE)range: < 3.0.1-150400.4.17.1
- (no CPE)range: < 1.0.2j-60.86.1
- Range: 3.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- git.openssl.org/gitweb/ghsapatchWEB
- git.openssl.org/gitweb/ghsapatchWEB
- git.openssl.org/gitweb/ghsapatchWEB
- github.com/advisories/GHSA-x4qr-2fvf-3mr5ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-0286ghsaADVISORY
- www.openssl.org/news/secadv/20230207.txtghsavendor-advisoryWEB
- access.redhat.com/security/cve/cve-2023-0286ghsaWEB
- ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.2-relnotes.txtghsaWEB
- ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/018_x509.patch.sigghsaWEB
- github.com/pyca/cryptography/security/advisories/GHSA-x4qr-2fvf-3mr5ghsaWEB
- psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0003ghsaWEB
- rustsec.org/advisories/RUSTSEC-2023-0006.htmlghsaWEB
- security.gentoo.org/glsa/202402-08ghsaWEB
News mentions
0No linked articles in our index yet.