This one's going to be messy -- check your code, check your certs...

http://openssl.org/news/secadv_20090107.txt

Incorrect checks for malformed signatures
  -------------------------------------------
Several functions inside OpenSSL incorrectly checked the result after 
calling the EVP_VerifyFinal function, allowing a malformed signature 
to be treated as a good signature rather than as an error. This issue 
affected the signature checks on DSA and ECDSA keys used with SSL/TLS.

One way to exploit this flaw would be for a remote attacker who is in 
control of a malicious server or who can use a 'man in the middle' 
attack to present a malformed SSL/TLS signature from a certificate 
chain to a vulnerable client, bypassing validation.

This vulnerability is tracked as CVE-2008-5077.

The OpenSSL security team would like to thank the Google Security Team 
for reporting this issue.

Who is affected?
-----------------
Everyone using OpenSSL releases prior to 0.9.8j as an SSL/TLS client 
when connecting to a server whose certificate contains a DSA or ECDSA 
key. Use of OpenSSL as an SSL/TLS client when connecting to a server 
whose certificate uses an RSA key is NOT affected. Verification of 
client certificates by OpenSSL servers for any key type is NOT affected.
[ ... ]

==========================================================================
"A cat spends her life conflicted between a deep, passionate and profound
desire for fish and an equally deep, passionate and profound desire to
avoid getting wet.  This is the defining metaphor of my life right now."
_______________________________________________
Tech mailing list
[email protected]
http://lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to