openssl 0.9.7j - RSA forgery

Open forum for security issues and info.
Forum rules
Any posts concerning pirated software or offering to buy/sell/trade commercial software are subject to removal.
User avatar
squeen
Moderator
Moderator
Posts: 2933
Joined: Fri May 09, 2003 6:10 am
Location: Maryland, USA

openssl 0.9.7j - RSA forgery

Unread postby squeen » Mon Sep 25, 2006 10:11 am

Description
-------------------------------------------------------------------------------------
OpenSSL versions 0.9.7j and prior and 0.9.8b and prior contain a vulnerability that could allow an unauthenticated, remote attacker to successfully pass a forged x.509 certificate.

The vulnerability could allow an unauthenticated, remote attacker to pass a forged Public-Key Cryptography Standards (PKCS)#1 Version 1.5 signature when signed by a certain type of RSA key. An attacker may be able to exploit this vulnerability to utilize a forged signature to gain access to certificate-protected resources.

OpenSSL confirmed this vulnerability in a security advisory and released updated versions.

Impact
-------------------------------------------------------------------------------------
An unauthenticated, remote attacker could exploit this vulnerability to gain access to certificate protected resources. This could result in the attacker disclosing protected information or taking actions as the user within the forged certificate.

Warning Indicators
-------------------------------------------------------------------------------------
OpenSSL versions 0.9.7j and prior and 0.9.8b and prior are vulnerable.

Technical Information
-------------------------------------------------------------------------------------
The vulnerability is due to an error when validating padding of PKCS #1 v1.5 signatures. If a RSA key with exponent 3 is used, an attacker may be able to forge a PKCS #1 v1.5 signature signed by that key. Because OpenSSL fails to check for excess data in the RSA exponentiation result of the signature, the certificate may inadvertently be marked as valid.

Safeguards
-------------------------------------------------------------------------------------
Administrators are advised to upgrade to the appropriate version.

Administrators are advised to utilize certificates as part of a two-factor authentication system.

Administrators may consider restricting access to certificate-protected resources to trusted users through the use of a VPN or other remote access technology that is not affected.



User avatar
nekonoko
Site Admin
Site Admin
Posts: 8145
Joined: Thu Jan 23, 2003 1:31 am
Location: Pleasanton, California
Contact:

Unread postby nekonoko » Mon Sep 25, 2006 11:19 am

Thanks for the heads up - I've uploaded neko_openssl-0.9.7k to beta.
Twitter: @neko_no_ko
IRIX Release 4.0.5 IP12 Version 06151813 System V
Copyright 1987-1992 Silicon Graphics, Inc.
All Rights Reserved.

User avatar
squeen
Moderator
Moderator
Posts: 2933
Joined: Fri May 09, 2003 6:10 am
Location: Maryland, USA

Unread postby squeen » Tue Sep 26, 2006 3:24 am

Awesome Neko. Thanks!

User avatar
nekonoko
Site Admin
Site Admin
Posts: 8145
Joined: Thu Jan 23, 2003 1:31 am
Location: Pleasanton, California
Contact:

Unread postby nekonoko » Thu Oct 19, 2006 2:47 am

neko_openssl-0.9.7l is now in beta - the 'k' release didn't last long :)
Twitter: @neko_no_ko
IRIX Release 4.0.5 IP12 Version 06151813 System V
Copyright 1987-1992 Silicon Graphics, Inc.
All Rights Reserved.

User avatar
squeen
Moderator
Moderator
Posts: 2933
Joined: Fri May 09, 2003 6:10 am
Location: Maryland, USA

Unread postby squeen » Thu Oct 19, 2006 3:01 am

Again thanks Neko. Folks here take SSH security pretty seriously. It's a big help to me to have the lastest and greatest on the IRIX server.

User avatar
nekonoko
Site Admin
Site Admin
Posts: 8145
Joined: Thu Jan 23, 2003 1:31 am
Location: Pleasanton, California
Contact:

Unread postby nekonoko » Thu Oct 19, 2006 3:55 pm

Not a problem - glad to do it :)
Twitter: @neko_no_ko
IRIX Release 4.0.5 IP12 Version 06151813 System V
Copyright 1987-1992 Silicon Graphics, Inc.
All Rights Reserved.


Return to “SGI: Security”

Who is online

Users browsing this forum: No registered users and 1 guest