Vulnerability Description
openssl_x509_check_email in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lua-Openssl Project | Lua-Openssl | 0.7.7-1 |
Related Weaknesses (CWE)
References
- https://github.com/zhaozg/lua-openssl/commit/a6dc186dd4b6b9e329a93cca3e7e3cfccfdPatchThird Party Advisory
- https://github.com/zhaozg/lua-openssl/commit/a6dc186dd4b6b9e329a93cca3e7e3cfccfdPatchThird Party Advisory
FAQ
What is CVE-2020-9433?
CVE-2020-9433 is a vulnerability with a CVSS score of 9.1 (CRITICAL). openssl_x509_check_email in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
How severe is CVE-2020-9433?
CVE-2020-9433 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-9433?
Check the references section above for vendor advisories and patch information. Affected products include: Lua-Openssl Project Lua-Openssl.