[pkg-ntp-maintainers] Bug#511227: ntp: OpenSSL signature verification API misuse
Steve Kostecke
kostecke at ntp.org
Thu Jan 8 16:53:42 UTC 2009
Package: ntp
Version: 1:4.2.2.p4+dfsg-2
Severity: normal
NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly
check the return value from the OpenSSL EVP_VerifyFinal function, which
allows remote attackers to bypass validation of the certificate chain
via a malformed SSL/TLS signature, a different vulnerability than
CVE-2008-5077 and CVE-2009-0025.
http://www.ocert.org/advisories/ocert-2008-016.html
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0021
-- System Information:
Debian Release: 4.0
APT prefers stable
APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.24-etchnhalf.1-amd64
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US (charmap=ISO-8859-1)
Versions of packages ntp depends on:
ii adduser 3.102 Add and remove users and groups
ii libc6 2.3.6.ds1-13etch8 GNU C Library: Shared libraries
ii libcap1 1:1.10-14 support for getting/setting POSIX.
ii libreadline5 5.2-2 GNU readline and history libraries
ii libssl0.9.8 0.9.8c-4etch3 SSL shared libraries
ii lsb-base 3.1-23.2etch1 Linux Standard Base 3.1 init scrip
ii netbase 4.29 Basic TCP/IP networking system
ii perl 5.8.8-7etch6 Larry Wall's Practical Extraction
ntp recommends no packages.
-- no debconf information
More information about the pkg-ntp-maintainers
mailing list