First published: Mon May 05 2008(Updated: )
A flaw was found in a way Red Hat Certificate System handled Extensions in the certificate signing requests (CSR). All requested Extensions were added to issued certificate despite constraints defined in Certificate Authority (CA) profile. For example, CSR could contain Basic Constraints or Key Usage constraint that once copied to issued certificate would result in creation of subordinate CA certificate, even though CA configuration prohibits issuing of subordinate CA certificate, possibly leading to a bypass the intended security policy. Affected versions: Red Hat Certificate System 7.1, 7.2, 7.3 Netscape Certificate Management System 6.x
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
IETF X.509 Certificate | =7.1 | |
IETF X.509 Certificate | =7.2 | |
IETF X.509 Certificate | =7.3 | |
Netscape Certificate Server | <=6.2 | |
Netscape Certificate Server | =6.0 | |
Netscape Certificate Server | =6.01 | |
Netscape Certificate Server | =6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1676 is considered to have a medium severity level due to improper handling of certificate extensions.
To fix CVE-2008-1676, ensure that your version of the Red Hat Certificate System is updated to the latest patch version.
CVE-2008-1676 affects Red Hat Certificate System versions 7.1, 7.2, and 7.3, as well as various versions of the Netscape Certificate Management System.
The consequences of CVE-2008-1676 include improperly issued certificates that may not respect the defined constraints, potentially compromising security.
CVE-2008-1676 does not specify a remote exploitation vector, but it could lead to the issuance of unauthorized certificates if exploited.