Gentoo Archives: gentoo-announce

From: Robert Buchholz <rbu@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200902-02 ] OpenSSL: Certificate validation error
Date: Thu, 12 Feb 2009 21:12:52
Message-Id: 200902122209.33979.rbu@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200902-02
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: OpenSSL: Certificate validation error
9 Date: February 12, 2009
10 Bugs: #251346
11 ID: 200902-02
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 An error in the OpenSSL certificate chain validation might allow for
19 spoofing attacks.
20
21 Background
22 ==========
23
24 OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer
25 (SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general
26 purpose cryptography library.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 dev-libs/openssl < 0.9.8j >= 0.9.8j
35
36 Description
37 ===========
38
39 The Google Security Team reported that several functions incorrectly
40 check the result after calling the EVP_VerifyFinal() function, allowing
41 a malformed signature to be treated as a good signature rather than as
42 an error. This issue affects the signature checks on DSA and ECDSA keys
43 used with SSL/TLS.
44
45 Impact
46 ======
47
48 A remote attacker could exploit this vulnerability and spoof arbitrary
49 names to conduct Man-In-The-Middle attacks and intercept sensitive
50 information.
51
52 Workaround
53 ==========
54
55 There is no known workaround at this time.
56
57 Resolution
58 ==========
59
60 All OpenSSL users should upgrade to the latest version:
61
62 # emerge --sync
63 # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8j"
64
65 References
66 ==========
67
68 [ 1 ] CVE-2008-5077
69 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077
70
71 Availability
72 ============
73
74 This GLSA and any updates to it are available for viewing at
75 the Gentoo Security Website:
76
77 http://security.gentoo.org/glsa/glsa-200902-02.xml
78
79 Concerns?
80 =========
81
82 Security is a primary focus of Gentoo Linux and ensuring the
83 confidentiality and security of our users machines is of utmost
84 importance to us. Any security concerns should be addressed to
85 security@g.o or alternatively, you may file a bug at
86 http://bugs.gentoo.org.
87
88 License
89 =======
90
91 Copyright 2009 Gentoo Foundation, Inc; referenced text
92 belongs to its owner(s).
93
94 The contents of this document are licensed under the
95 Creative Commons - Attribution / Share Alike license.
96
97 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature