RSA verification recovery in the EVP_PKEY_verify_recover function in OpenSSL 1.x before 1.0.0a, as used by pkeyutl and possibly other applications, returns uninitialized memory upon failure, which might allow context-dependent attackers to bypass intended key requirements or obtain sensitive information via unspecified vectors. NOTE: some of these details are obtained from third party information.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2010/1313 | vdb entry patch vendor advisory |
http://secunia.com/advisories/40024 | third party advisory vendor advisory |
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564 | |
http://cvs.openssl.org/filediff?f=openssl/crypto/rsa/rsa_pmeth.c&v1=1.34&v2=1.34.2.1 | |
http://secunia.com/advisories/57353 | third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=598732 | |
http://www.securityfocus.com/bid/40503 | vdb entry |
http://cvs.openssl.org/chngview?cn=19693 | |
http://www.openssl.org/news/secadv_20100601.txt |