CVE-2009-0124

The tqsl_verifyDataBlock function in openssl_cert.cpp in American Radio Relay League (ARRL) tqsllib 2.0 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.
Configurations

Configuration 1 (hide)

cpe:2.3:a:arrl:tqsllib:2.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:59

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511509 - Exploit () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511509 - Exploit
References () http://openwall.com/lists/oss-security/2009/01/12/4 - () http://openwall.com/lists/oss-security/2009/01/12/4 -
References () http://secunia.com/advisories/33543 - () http://secunia.com/advisories/33543 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=479650 - () https://bugzilla.redhat.com/show_bug.cgi?id=479650 -
References () https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00557.html - () https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00557.html -

Information

Published : 2009-01-15 17:30

Updated : 2024-11-21 00:59


NVD link : CVE-2009-0124

Mitre link : CVE-2009-0124

CVE.ORG link : CVE-2009-0124


JSON object : View

Products Affected

arrl

  • tqsllib
CWE
CWE-287

Improper Authentication