Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2009-0126

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2009-0126
Last Modified 06 Mar 2009 01:49:14
Published 15 Jan 2009 12:30:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact NONE NONE
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2009-0126

Summary

The decrypt_public function in lib/crypt.cpp in the client in Berkeley Open Infrastructure for Network Computing (BOINC) 6.2.14 and 6.4.5 does not check the return value from the OpenSSL RSA_public_decrypt function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.

Vulnerable Systems

Application

  • Berkeley Boinc Client 6.2.14

  • Berkeley Boinc Client 6.4.5


References

FEDORA - FEDORA-2009-0578

CONFIRM - https://bugzilla.redhat.com/show_bug.cgi?id=479664

SECUNIA - 33828

SECUNIA - 33806

MLIST - [oss-security] 20090112 CVE Request -- tsqllib, slurm-llnl, libnasl, libcrypt-openssl-dsa-perl, erlang, boinc-client, m2crypto

SUSE - SUSE-SR:2009:003

CONFIRM - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511521

CONFIRM - http://boinc.berkeley.edu/trac/ticket/823

CONFIRM - http://boinc.berkeley.edu/trac/changeset/16883


Last Updated: 27 May 2016 10:50:07