First published: Sun Jan 11 2009(Updated: )
** DISPUTED ** M2Crypto does not properly check the return value from the OpenSSL EVP_VerifyFinal, DSA_verify, ECDSA_verify, DSA_do_verify, and ECDSA_do_verify functions, which might allow remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077. NOTE: a Linux vendor disputes the relevance of this report to the M2Crypto product because "these functions are not used anywhere in m2crypto."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
M2Crypto |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0127 has a moderate severity level due to the potential for certificate chain validation bypass.
To resolve CVE-2009-0127, update M2Crypto to the latest version where the vulnerability has been addressed.
CVE-2009-0127 specifically affects M2Crypto versions that do not properly handle SSL/TLS signature verification.
CVE-2009-0127 may allow remote attackers to bypass validation of the certificate chain using malformed SSL/TLS signatures.
CVE-2009-0127 was publicly reported in January 2009 and is not classified as a zero-day vulnerability.