Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2009-0125

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2009-0125
Last Modified 10 Feb 2009 12:00:00
Published 15 Jan 2009 12:30:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact NONE NONE
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2009-0125

Summary

** DISPUTED ** NOTE: this issue has been disputed by the upstream vendor. nasl/nasl_crypto2.c in the Nessus Attack Scripting Language library (aka libnasl) 2.2.11 does not properly check the return value from the OpenSSL DSA_do_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077. NOTE: the upstream vendor has disputed this issue, stating "while we do misuse this function (this is a bug), it has absolutely no security ramification."

Vulnerable Systems

Application

  • Finkproject Libnasl 2.2.11


References

CONFIRM - https://bugzilla.redhat.com/show_bug.cgi?id=479655

VIM - 20090120 CVE-2009-0125 (fwd)

MLIST - [oss-security] 20090112 CVE Request -- tsqllib, slurm-llnl, libnasl, libcrypt-openssl-dsa-perl, erlang, boinc-client, m2crypto

SUSE - SUSE-SR:2009:003

CONFIRM - http://cvs.fedoraproject.org/viewvc/rpms/libnasl/F-10/libnasl.spec?r1=1.16&r2=1.17

MISC - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511517


Last Updated: 27 May 2016 10:50:07