The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certificate verifications via a valid leaf certificate.
2015-07-09T19:17:00.093
2025-04-12T10:46:40.837
Deferred
CVSSv3.0: 6.5 (MEDIUM)
AV:N/AC:L/Au:N/C:P/I:P/A:N
10.0
4.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | oracle | supply_chain_products_suite | 6.1.2.2 | Yes |
Application | oracle | supply_chain_products_suite | 6.1.3.0 | Yes |
Application | oracle | supply_chain_products_suite | 6.2.0 | Yes |
Application | oracle | jd_edwards_enterpriseone_tools | 9.1 | Yes |
Application | oracle | jd_edwards_enterpriseone_tools | 9.2 | Yes |
Application | openssl | openssl | 1.0.1n | Yes |
Application | openssl | openssl | 1.0.1o | Yes |
Application | openssl | openssl | 1.0.2b | Yes |
Application | openssl | openssl | 1.0.2c | Yes |
Operating System | oracle | opus_10g_ethernet_switch_family | ≤ 2.0.0.6 | Yes |