CVE-2024-6119
OpenSSL vulnerability analysis and mitigation

Overview

CVE-2024-6119 affects OpenSSL versions 3.3, 3.2, 3.1, and 3.0, discovered on June 16, 2024. The vulnerability involves applications performing certificate name checks, particularly TLS clients checking server certificates, which may attempt to read an invalid memory address. This issue affects certificate name validation functionality but does not impact basic certificate chain validation (signatures, dates, etc.) (OpenSSL Advisory).

Technical details

The vulnerability occurs when comparing the expected name with an otherName subject alternative name of an X.509 certificate. The GENERAL_TYPE data type is a union, and incorrect access of member fields based on gen->type can lead to a segfault. The issue specifically arises during certificate name checks when the application specifies an expected DNS name, Email address, or IP address (OpenSSL Advisory, GitHub Commit).

Impact

The vulnerability can result in abnormal termination of the application process, causing a denial of service (DoS). The impact is considered Moderate as TLS servers rarely solicit client certificates, and even when they do, they generally don't perform name checks against reference identifiers. The FIPS modules in affected versions are not impacted by this vulnerability (OpenSSL Advisory).

Mitigation and workarounds

Users should upgrade to the following fixed versions: OpenSSL 3.3.2 for 3.3 users, OpenSSL 3.2.3 for 3.2 users, OpenSSL 3.1.7 for 3.1 users, and OpenSSL 3.0.15 for 3.0 users. OpenSSL versions 1.1.1 and 1.0.2 are not affected by this vulnerability (OpenSSL Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management