CVE-2021-23841 (CNNVD-202102-1200)

MEDIUM
中文标题:
OpenSSL 代码问题漏洞
英文标题:
Null pointer deref in X509_issuer_and_serial_hash()
CVSS分数: 5.9
发布时间: 2021-02-16 16:55:18
漏洞类型: 代码问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

OpenSSL是Openssl团队的一个开源的能够实现安全套接层(SSLv2/v3)和安全传输层(TLSv1)协议的通用加密库。该产品支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。 OpenSSL public API 存在代码问题漏洞,该漏洞源于 X509_issuer_and_serial_hash 函数不能正确处理解析 issuer 字段时可能发生的任何错误。

英文描述:

The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).

CWE类型:
CWE-476
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
OpenSSL OpenSSL Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i) - - cpe:2.3:a:openssl:openssl:fixed_in_openssl_1.1.1j_(affected_1.1.1-1.1.1i):*:*:*:*:*:*:*
OpenSSL OpenSSL Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x) - - cpe:2.3:a:openssl:openssl:fixed_in_openssl_1.0.2y_(affected_1.0.2-1.0.2x):*:*:*:*:*:*:*
openssl openssl * - - cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
debian debian_linux 10.0 - - cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
tenable nessus_network_monitor 5.11.0 - - cpe:2.3:a:tenable:nessus_network_monitor:5.11.0:*:*:*:*:*:*:*
tenable nessus_network_monitor 5.11.1 - - cpe:2.3:a:tenable:nessus_network_monitor:5.11.1:*:*:*:*:*:*:*
tenable nessus_network_monitor 5.12.0 - - cpe:2.3:a:tenable:nessus_network_monitor:5.12.0:*:*:*:*:*:*:*
tenable nessus_network_monitor 5.12.1 - - cpe:2.3:a:tenable:nessus_network_monitor:5.12.1:*:*:*:*:*:*:*
tenable nessus_network_monitor 5.13.0 - - cpe:2.3:a:tenable:nessus_network_monitor:5.13.0:*:*:*:*:*:*:*
tenable tenable.sc * - - cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*
apple safari * - - cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
apple ipados * - - cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
apple iphone_os * - - cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
apple macos * - - cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
netapp oncommand_insight - - - cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
netapp oncommand_workflow_automation - - - cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
netapp snapcenter - - - cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
oracle business_intelligence 5.5.0.0.0 - - cpe:2.3:a:oracle:business_intelligence:5.5.0.0.0:*:*:*:enterprise:*:*:*
oracle business_intelligence 5.9.0.0.0 - - cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*
oracle business_intelligence 12.2.1.3.0 - - cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*
oracle business_intelligence 12.2.1.4.0 - - cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*
oracle communications_cloud_native_core_policy 1.15.0 - - cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*
oracle enterprise_manager_for_storage_management 13.4.0.0 - - cpe:2.3:a:oracle:enterprise_manager_for_storage_management:13.4.0.0:*:*:*:*:*:*:*
oracle enterprise_manager_ops_center 12.4.0.0 - - cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*
oracle essbase 21.2 - - cpe:2.3:a:oracle:essbase:21.2:*:*:*:*:*:*:*
oracle graalvm 19.3.5 - - cpe:2.3:a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:*
oracle graalvm 20.3.1.2 - - cpe:2.3:a:oracle:graalvm:20.3.1.2:*:*:*:enterprise:*:*:*
oracle graalvm 21.0.0.2 - - cpe:2.3:a:oracle:graalvm:21.0.0.2:*:*:*:enterprise:*:*:*
oracle jd_edwards_world_security a9.4 - - cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*
oracle mysql_enterprise_monitor * - - cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
oracle mysql_server * - - cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
oracle peoplesoft_enterprise_peopletools 8.57 - - cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
oracle peoplesoft_enterprise_peopletools 8.58 - - cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
oracle peoplesoft_enterprise_peopletools 8.59 - - cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*
oracle zfs_storage_appliance_kit 8.8 - - cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
siemens sinec_ins * - - cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*
siemens sinec_ins 1.0 - - cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
DSA-4855 vendor-advisory
cve.org
访问
GLSA-202103-03 vendor-advisory
cve.org
访问
20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4 mailing-list
cve.org
访问
20210526 APPLE-SA-2021-05-25-5 Safari 14.1.1 mailing-list
cve.org
访问
20210526 APPLE-SA-2021-05-25-1 iOS 14.6 and iPadOS 14.6 mailing-list
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
CVSS评分详情
5.9
MEDIUM
CVSS向量: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS版本: 3.1
机密性
NONE
完整性
NONE
可用性
HIGH
时间信息
发布时间:
2021-02-16 16:55:18
修改时间:
2024-09-16 22:39:57
创建时间:
2025-11-11 15:36:41
更新时间:
2025-11-11 15:56:36
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2021-23841 2025-11-11 15:20:50 2025-11-11 07:36:41
NVD nvd_CVE-2021-23841 2025-11-11 14:57:34 2025-11-11 07:45:01
CNNVD cnnvd_CNNVD-202102-1200 2025-11-11 15:10:35 2025-11-11 07:56:36
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:56:36
vulnerability_type: 未提取 → 代码问题; cnnvd_id: 未提取 → CNNVD-202102-1200; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 代码问题
  • cnnvd_id: 未提取 -> CNNVD-202102-1200
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:45:01
cvss_score: 未提取 → 5.9; cvss_vector: NOT_EXTRACTED → CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H; cvss_version: NOT_EXTRACTED → 3.1; affected_products_count: 2 → 37; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • cvss_score: 未提取 -> 5.9
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  • cvss_version: NOT_EXTRACTED -> 3.1
  • affected_products_count: 2 -> 37
  • data_sources: ['cve'] -> ['cve', 'nvd']