First published: Thu Jan 15 2009(Updated: )
** DISPUTED ** lib/crypto/c_src/crypto_drv.c in erlang does not properly check the return value from the OpenSSL DSA_do_verify function, which might allow remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077. NOTE: a package maintainer disputes this issue, reporting that there is a proper check within the only code that uses the applicable part of crypto_drv.c, and thus "this report is invalid."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Erlang/OTP | =_nil_ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0130 is considered a medium severity vulnerability that could lead to the bypass of certificate chain validation.
To fix CVE-2009-0130, upgrade to a patched version of Erlang that addresses the vulnerability in the crypto_drv.c file.
CVE-2009-0130 can be exploited by remote attackers to bypass SSL/TLS signature validation using a malformed certificate.
CVE-2009-0130 affects versions of Erlang/OTP that utilize the vulnerable crypto_drv.c implementation without proper return value checks.
Yes, CVE-2009-0130 is similar to CVE-2008-5077 in its nature of allowing certificate validation bypass.