### [CVE-2023-0217](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0217) ![](https://img.shields.io/static/v1?label=Product&message=OpenSSL&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=3.0.0%3C%203.0.8%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=invalid%20pointer%20dereference&color=brighgreen) ### Description An invalid pointer dereference on read can be triggered when anapplication tries to check a malformed DSA public key by theEVP_PKEY_public_check() function. This will most likely leadto an application crash. This function can be called on publickeys supplied from untrusted sources which could allow an attackerto cause a denial of service attack.The TLS implementation in OpenSSL does not call this functionbut applications might call the function if there are additionalsecurity requirements imposed by standards such as FIPS 140-3. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Tuttu7/Yum-command - https://github.com/a23au/awe-base-images - https://github.com/chnzzh/OpenSSL-CVE-lib - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/stkcat/awe-base-images