[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195521

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SA:2009:006 -- SUSE openssl SSL certificate checking bypass

ID: oval:org.secpod.oval:def:400091Date: (C)2012-01-31   (M)2022-08-04
Class: PATCHFamily: unix




The OpenSSL certificate checking routines EVP_VerifyFinal can return negative values and 0 on failure. In some places negative values were not checked and considered successful verification. Prior to this update it was possible to bypass the certification chain checks of openssl. This advisory is for the updates that improve the verification of return values inside the OpenSSL library itself. Several client programs also need to receive fixes to check that return value. A bind update which fixes this was already released yesterday, tracked in SUSE-SA:2009:005. A boinc-client and libnasl update was also released yesterday. Updates for ntp,xntp, and eID-Belgium are being prepared.

Platform:
openSUSE 10.3
openSUSE 11.1
openSUSE 11.0
Product:
openssl
Reference:
SUSE-SA:2009:006
CVE-2008-5077
CVE    1
CVE-2008-5077
CPE    3
cpe:/o:opensuse:opensuse:11.1
cpe:/o:opensuse:opensuse:11.0
cpe:/o:opensuse:opensuse:10.3

© SecPod Technologies