First published: Thu Jul 09 2015(Updated: )
The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certificate verifications via a valid leaf certificate.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Supply Chain Products Suite | =6.1.2.2 | |
Oracle Supply Chain Products Suite | =6.1.3.0 | |
Oracle Supply Chain Products Suite | =6.2.0 | |
Oracle Jd Edwards Enterpriseone Tools | =9.1 | |
Oracle Jd Edwards Enterpriseone Tools | =9.2 | |
OpenSSL OpenSSL | =1.0.1n | |
OpenSSL OpenSSL | =1.0.1o | |
OpenSSL OpenSSL | =1.0.2b | |
OpenSSL OpenSSL | =1.0.2c | |
Oracle Opus 10g Ethernet Switch Family | <=2.0.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.