Vulnerability Description
The tqsl_verifyDataBlock function in openssl_cert.cpp in American Radio Relay League (ARRL) tqsllib 2.0 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Arrl | Tqsllib | 2.0 |
Related Weaknesses (CWE)
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511509Exploit
- http://openwall.com/lists/oss-security/2009/01/12/4
- http://secunia.com/advisories/33543
- https://bugzilla.redhat.com/show_bug.cgi?id=479650
- https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00557.ht
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511509Exploit
- http://openwall.com/lists/oss-security/2009/01/12/4
- http://secunia.com/advisories/33543
- https://bugzilla.redhat.com/show_bug.cgi?id=479650
- https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00557.ht
FAQ
What is CVE-2009-0124?
CVE-2009-0124 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The tqsl_verifyDataBlock function in openssl_cert.cpp in American Radio Relay League (ARRL) tqsllib 2.0 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows...
How severe is CVE-2009-0124?
CVE-2009-0124 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-0124?
Check the references section above for vendor advisories and patch information. Affected products include: Arrl Tqsllib.