Vulnerability Description
M2Crypto does not properly check the return value from the OpenSSL EVP_VerifyFinal, DSA_verify, ECDSA_verify, DSA_do_verify, and ECDSA_do_verify functions, which might allow remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077. NOTE: a Linux vendor disputes the relevance of this report to the M2Crypto product because "these functions are not used anywhere in m2crypto.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Heikkitoivonen | M2Crypto | - |
Related Weaknesses (CWE)
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511515Third Party Advisory
- http://openwall.com/lists/oss-security/2009/01/12/4Mailing List
- https://bugzilla.redhat.com/show_bug.cgi?id=479676ExploitIssue Tracking
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511515Third Party Advisory
- http://openwall.com/lists/oss-security/2009/01/12/4Mailing List
- https://bugzilla.redhat.com/show_bug.cgi?id=479676ExploitIssue Tracking
FAQ
What is CVE-2009-0127?
CVE-2009-0127 is a vulnerability with a CVSS score of 5.0 (MEDIUM). M2Crypto does not properly check the return value from the OpenSSL EVP_VerifyFinal, DSA_verify, ECDSA_verify, DSA_do_verify, and ECDSA_do_verify functions, which might allow remote attackers to bypass...
How severe is CVE-2009-0127?
CVE-2009-0127 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-0127?
Check the references section above for vendor advisories and patch information. Affected products include: Heikkitoivonen M2Crypto.