The libCheckSignature function in crypto-utils.lib for OpenCA 0.9.1.6 and earlier only compares the serial of the signer's certificate and the one in the database, which can cause OpenCA to incorrectly accept a signature if the certificate's chain is trusted by OpenCA's chain directory, allowing remote attackers to spoof requests from other users.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/9435 | patch vendor advisory vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/14847 | vdb entry |
http://www.osvdb.org/3615 | vdb entry |
http://www.kb.cert.org/vuls/id/336446 | third party advisory us government resource |
http://www.openca.org/news/CAN-2004-0004.txt | patch vendor advisory |
http://marc.info/?l=bugtraq&m=107427313700554&w=2 | mailing list |