The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most users of `OCSP_basic_verify` will not use the OCSP_NOCHECKS flag. In this case the `OCSP_basic_verify` function will return a negative value (indicating a fatal error) in the case of a certificate verification failure. The normal expected return value in this case would be 0. This issue also impacts the command line OpenSSL "ocsp" application. When verifying an ocsp response with the "-no_cert_checks" option the command line application will report that the verification is successful even though it has in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).
Project Subscriptions
| Vendors | Products |
|---|---|
|
Netapp
Subscribe
|
A250
Subscribe
A250 Firmware
Subscribe
A700s
Subscribe
A700s Firmware
Subscribe
Active Iq Unified Manager
Subscribe
Aff 500f
Subscribe
Aff 500f Firmware
Subscribe
Aff 8300
Subscribe
Aff 8300 Firmware
Subscribe
Aff 8700
Subscribe
Aff 8700 Firmware
Subscribe
Aff A400
Subscribe
Aff A400 Firmware
Subscribe
Clustered Data Ontap
Subscribe
Clustered Data Ontap Antivirus Connector
Subscribe
Fabric-attached Storage A400
Subscribe
Fabric-attached Storage A400 Firmware
Subscribe
Fas 500f
Subscribe
Fas 500f Firmware
Subscribe
Fas 8300
Subscribe
Fas 8300 Firmware
Subscribe
Fas 8700
Subscribe
Fas 8700 Firmware
Subscribe
H300e
Subscribe
H300e Firmware
Subscribe
H300s
Subscribe
H300s Firmware
Subscribe
H410s
Subscribe
H410s Firmware
Subscribe
H500e
Subscribe
H500e Firmware
Subscribe
H500s
Subscribe
H500s Firmware
Subscribe
H700e
Subscribe
H700e Firmware
Subscribe
H700s
Subscribe
H700s Firmware
Subscribe
Santricity Smi-s Provider
Subscribe
Smi-s Provider
Subscribe
Snapmanager
Subscribe
Solidfire\, Enterprise Sds \& Hci Storage Node
Subscribe
Solidfire \& Hci Management Node
Subscribe
|
|
Openssl
Subscribe
|
Openssl
Subscribe
|
|
Redhat
Subscribe
|
Enterprise Linux
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4552 | The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most users of `OCSP_basic_verify` will not use the OCSP_NOCHECKS flag. In this case the `OCSP_basic_verify` function will return a negative value (indicating a fatal error) in the case of a certificate verification failure. The normal expected return value in this case would be 0. This issue also impacts the command line OpenSSL "ocsp" application. When verifying an ocsp response with the "-no_cert_checks" option the command line application will report that the verification is successful even though it has in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). |
Github GHSA |
GHSA-mfm6-r9g2-q4r7 | `OCSP_basic_verify` may incorrectly verify the response signing certificate |
Ubuntu USN |
USN-5402-1 | OpenSSL vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 05 May 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: openssl
Published:
Updated: 2025-05-05T16:42:39.898Z
Reserved: 2022-04-13T00:00:00.000Z
Link: CVE-2022-1343
Updated: 2024-08-03T00:03:05.875Z
Status : Modified
Published: 2022-05-03T16:15:18.873
Modified: 2025-05-05T17:17:34.273
Link: CVE-2022-1343
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA
Ubuntu USN