First published: Wed Jan 07 2009(Updated: )
Lasso 2.2.1 and earlier does not properly check the return value from the OpenSSL DSA_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Entrovert Lasso | <=2.2.1-0 | |
Entrovert Lasso | =1.9.9.0 | |
Entrovert Lasso | =2.0.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0050 is considered to have a moderate severity level due to its potential for allowing remote attackers to bypass SSL/TLS certificate validation.
To fix CVE-2009-0050, upgrade Lasso to version 2.2.2 or later where the vulnerability has been addressed.
CVE-2009-0050 affects Lasso versions 2.2.1 and earlier, including specific versions 1.9.9.0 and 2.0.0-1.
Yes, CVE-2009-0050 can be exploited remotely by attackers through malformed SSL/TLS signatures.
CVE-2009-0050 is a vulnerability related to improper validation of SSL/TLS signatures in the OpenSSL library.