OpenSSL signature verification API misuses
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
bind9 (Ubuntu) |
Fix Released
|
Medium
|
Jamie Strandboge | ||
ntp (Ubuntu) |
Fix Released
|
Medium
|
Jamie Strandboge | ||
openslp-dfsg (Ubuntu) |
Won't Fix
|
Low
|
Jamie Strandboge | ||
openssl (Ubuntu) |
Fix Released
|
High
|
Jamie Strandboge |
Bug Description
Binary package hint: openssl
Please see the details in the oCERT advisory #2008-016:
http://
"Several functions inside the OpenSSL library incorrectly check the result after calling the EVP_VerifyFinal function.
This bug allows a malformed signature to be treated as a good signature rather than as an error. This issue affects the signature checks on DSA and ECDSA keys used with SSL/TLS.
The flaw may be exploited by a malicious server or a man-in-the-middle attack that presents a malformed SSL/TLS signature from a certificate chain to a vulnerable client, bypassing validation."
This affects not only OpenSSL, but also Bind, NTP and some other packages.
Changed in openslp-dfsg: | |
assignee: | nobody → jdstrand |
status: | New → Triaged |
Changed in bind9: | |
importance: | Undecided → High |
Changed in ntp: | |
importance: | Undecided → High |
Changed in openslp-dfsg: | |
importance: | Undecided → High |
Changed in openssl: | |
importance: | Undecided → High |
Changed in bind9: | |
status: | In Progress → Fix Committed |
Changed in ntp: | |
importance: | High → Medium |
Changed in bind9: | |
importance: | High → Medium |
Changed in openslp-dfsg: | |
status: | Triaged → In Progress |
Changed in openslp-dfsg: | |
importance: | High → Medium |
Thank you for using Ubuntu and taking the time to report a bug.