First published: Thu Jan 15 2009(Updated: )
plugins/crypto/openssl/crypto_openssl.c in Simple Linux Utility for Resource Management (aka SLURM or slurm-llnl) does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SchedMD Slurm | =_nil_ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2009-0128 is considered medium due to potential exploitation by attackers to bypass validation of the certificate chain.
To fix CVE-2009-0128, update to a patched version of SLURM that properly checks the return value from the OpenSSL EVP_VerifyFinal function.
CVE-2009-0128 can allow remote attackers to bypass SSL/TLS certificate validation, leading to potential man-in-the-middle attacks.
CVE-2009-0128 specifically affects versions of SLURM that are identified as '_nil_'.
Check the version of your installed SLURM software against the vulnerable version and review OpenSSL handling in the crypto_openssl.c implementation.