Lucene search

K
certCERTVU:336446
HistoryJan 19, 2004 - 12:00 a.m.

OpenCA libCheckSignature function fails to properly verify the signature of certificates

2004-01-1900:00:00
www.kb.cert.org
10

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.018 Low

EPSS

Percentile

88.0%

Overview

OpenCA may accept a signature from a certificate if the certificate’s chain is trusted by the chain directory of OpenCA.

Description

The OpenCA PKI Development Project is a Certification Authority. A vulnerability exists in the way the libCheckSignature function compares the certificate in the database and the certificate of the signer.

From the OpenCA Security Advisory:
The comparison of the certificate in the database and the certificate of the signer was only performed on base of the serial of the certificate. The design of the function can cause the acceptance
of a signature if the chain of the signature can create a trust relationship to the chain directory of OpenCA and a certificate with a matching serial exists in the used PKI.

See the OpenCA Security Advisory for further details.


Impact

OpenCA may accept the signature of a certificate if the certificate’s chain is trusted by the chain directory of OpenCA. This could allow a certificate from another PKI to authorize operations on the used PKI.


Solution

Upgrade
OpenCA version 0.9.1.7 has been released to address this vulnerability.

Apply Patch
OpenCA has supplied a patch which resolves this issue.


Vendor Information

336446

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

OpenCA Affected

Updated: January 19, 2004

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23336446 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to OpenCA for the information contained in their security advisory. OpenCA credits Alexandru Matei for discovering this vulnerability.

This document was written by Damon Morda.

Other Information

CVE IDs: CVE-2004-0004
Severity Metric: 1.69 Date Public:

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.018 Low

EPSS

Percentile

88.0%