First published: Wed Jan 07 2009(Updated: )
NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
NTP ntp | <=4.2.4p4 | |
NTP ntp | =4.2.0 | |
NTP ntp | =4.2.2 | |
NTP ntp | =4.2.4p1 | |
NTP ntp | =4.2.4p2 | |
NTP ntp | =4.2.4p3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0021 is classified as a high-severity vulnerability due to its potential to allow certificate chain validation bypass.
To fix CVE-2009-0021, upgrade to NTP version 4.2.4p5 or later, or 4.2.5p150 or later.
CVE-2009-0021 affects NTP versions prior to 4.2.4p5 and 4.2.5 versions before 4.2.5p150.
Exploitation of CVE-2009-0021 could allow remote attackers to bypass SSL/TLS certificate validation by using malformed signatures.
CVE-2009-0021 specifically affects the DSA and ECDSA keys used in SSL/TLS communications.