First published: Mon Oct 19 2020(Updated: )
AuthenticodeVerify() calls OpenSSLs d2i_PKCS7() API to parse asn encoded signed authenticode pkcs#7 data. when this successfully returns, a type check is done by calling PKCS7_type_is_signed() and then Pkcs7->d.sign->contents->type is used. It is possible to construct an asn1 blob that successfully decodes and have d2i_PKCS7() return a valid pointer and have PKCS7_type_is_signed() also return success but have Pkcs7->d.sign be a NULL pointer. Reference: <a href="https://bugzilla.tianocore.org/show_bug.cgi?id=1914">https://bugzilla.tianocore.org/show_bug.cgi?id=1914</a>
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1889486 is high due to potential remote code execution vulnerabilities.
To fix REDHAT-BUG-1889486, update OpenSSL to the latest patched version provided by your distribution.
REDHAT-BUG-1889486 affects OpenSSL implementations utilizing the AuthenticodeVerify() functionality.
The impact of REDHAT-BUG-1889486 could allow an attacker to exploit the vulnerability to execute arbitrary code.
A potential workaround for REDHAT-BUG-1889486 is to disable the use of PKCS#7 signed data until an update can be applied.