[Pkg-openssl-devel] Bug#670121: OpenSSL ASN1 BIO vulnerability (CVE-2012-2110)
Aki Tuomi
cmouse at youzen.ext.b2.fi
Thu Apr 19 18:40:07 UTC 2012
Package: libssl0.9.8
Version: 0.9.8o-4squeeze7
OpenSSL Security Advisory [19 Apr 2012]
=======================================
ASN1 BIO vulnerability (CVE-2012-2110)
=======================================
A potentially exploitable vulnerability has been discovered in the OpenSSL
function asn1_d2i_read_bio.
Any application which uses BIO or FILE based functions to read untrusted DER
format data is vulnerable. Affected functions are of the form d2i_*_bio or
d2i_*_fp, for example d2i_X509_bio or d2i_PKCS12_fp.
Applications using the memory based ASN1 functions (d2i_X509, d2i_PKCS12 etc)
are not affected. In particular the SSL/TLS code of OpenSSL is *not* affected.
Applications only using the PEM routines are not affected.
S/MIME or CMS applications using the built in MIME parser SMIME_read_PKCS7 or
SMIME_read_CMS *are* affected.
The OpenSSL command line utility is also affected if used to process untrusted
data in DER format.
Note: although an application using the SSL/TLS portions of OpenSSL is not
automatically affected it might still call a function such as d2i_X509_bio on
untrusted data and be vulnerable.
Thanks to Tavis Ormandy, Google Security Team, for discovering this issue and
to Adam Langley <agl at chromium.org> for fixing it.
Affected users should upgrade to OpenSSL 1.0.1a, 1.0.0i or 0.9.8v.
References
==========
URL for this Security Advisory:
http://www.openssl.org/news/secadv_20120419.txt
Aki Tuomi
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: Digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-openssl-devel/attachments/20120419/29936b3b/attachment.pgp>
More information about the Pkg-openssl-devel
mailing list