Pardus: Openssl: Spoofing
Posted by Benjamin D. Thomas   
A vulnerability has been reported in OpenSSL, which can be exploited by malicious people to conduct spoofing attacks.

------------------------------------------------------------------------
Pardus Linux Security Advisory 2009-02            security@pardus.org.tr
------------------------------------------------------------------------
      Date: 2009-01-14
  Severity: 3
      Type: Remote
------------------------------------------------------------------------

Summary
=======

A vulnerability has been reported in OpenSSL, which can be exploited by 
malicious people to conduct spoofing attacks. 


Description
===========

The vulnerability is  caused  due  to  certain  OpenSSL  functions  not 
correctly verifying the return value of the "EVP_VerifyFinal()" function
when validating the signature of  DSA  and  ECDSA  keys.  This  can  be 
exploited to bypass the signature check by  e.g.  sending  a  specially 
crafted signature of a certificate chain to a client. 



Successful exploitation requires that the  server  uses  a  certificate 
containing a DSA or ECDSA key. 



Affected packages:

  Pardus 2008:
    openssl, all before 0.9.8i-17-6


Resolution
==========

There are update(s) for openssl. You can update them via Package Manager
or with a single command from console: 

    pisi up openssl

References
==========

  * http://bugs.pardus.org.tr/show_bug.cgi?id=8988
  * http://www.openssl.org/news/secadv_20090107.txt
  * http://www.ocert.org/advisories/ocert-2008-016.html
  * http://secunia.com/Advisories/33338/l