GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Fri Jul 10, 2015 3:26 pm Post subject: [ GLSA 201507-15 ] OpenSSL |
|
|
Gentoo Linux Security Advisory
Title: OpenSSL: Alternate chains certificate forgery (GLSA 201507-15)
Severity: normal
Exploitable: remote
Date: July 10, 2015
Updated: February 26, 2016
Bug(s): #554172
ID: 201507-15
Synopsis
Certain checks on untrusted certificates can be bypassed.
Background
OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer
(SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general
purpose cryptography library.
Affected Packages
Package: dev-libs/openssl
Vulnerable: < 1.0.1p
Unaffected: >= 1.0.1p
Unaffected: >= 0.9.8z_p6 < 0.9.9
Unaffected: >= 0.9.8z_p7 < 0.9.9
Unaffected: >= 0.9.8z_p8 < 0.9.9
Unaffected: >= 0.9.8z_p9 < 0.9.9
Unaffected: >= 0.9.8z_p10 < 0.9.9
Unaffected: >= 0.9.8z_p11 < 0.9.9
Unaffected: >= 0.9.8z_p12 < 0.9.9
Unaffected: >= 0.9.8z_p13 < 0.9.9
Unaffected: >= 0.9.8z_p14 < 0.9.9
Unaffected: >= 0.9.8z_p15 < 0.9.9
Architectures: All supported architectures
Description
During certificate verification, OpenSSL attempts to find an alternative
certificate chain if the first attempt to build such a chain fails.
Impact
A remote attacker could cause certain checks on untrusted
certificates to be bypassed, such as the CA flag, enabling them to use a
valid leaf certificate to act as a CA and “issue” an invalid
certificate.
Workaround
There is no known workaround at this time.
Resolution
All OpenSSL users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.1p"
|
References
CVE-2015-1793
Last edited by GLSA on Sat Feb 27, 2016 4:16 am; edited 2 times in total |
|