First published: Fri Mar 27 2009(Updated: )
The CMS_verify function in OpenSSL 0.9.8h through 0.9.8j, when CMS is enabled, does not properly handle errors associated with malformed signed attributes, which allows remote attackers to repudiate a signature that originally appeared to be valid but was actually invalid.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | =0.9.8j | |
OpenSSL libcrypto | =0.9.8i | |
OpenSSL libcrypto | =0.9.8h |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0591 has a moderate severity rating due to its potential to allow repudiation of signatures.
To fix CVE-2009-0591, it is recommended to upgrade OpenSSL to a version beyond 0.9.8j.
CVE-2009-0591 affects OpenSSL versions 0.9.8h through 0.9.8j that have CMS enabled.
Yes, CVE-2009-0591 can be exploited by remote attackers to repudiate signatures.
The impact of CVE-2009-0591 includes the ability for attackers to compromise the integrity of digitally signed data.