The X509verifycert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certificate verifications via a valid leaf certificate.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libcrypto1.0.0-udeb",
"binary_version": "1.0.1f-1ubuntu2.15"
},
{
"binary_name": "libcrypto1.0.0-udeb-dbgsym",
"binary_version": "1.0.1f-1ubuntu2.15"
},
{
"binary_name": "libssl-dev",
"binary_version": "1.0.1f-1ubuntu2.15"
},
{
"binary_name": "libssl-dev-dbgsym",
"binary_version": "1.0.1f-1ubuntu2.15"
},
{
"binary_name": "libssl-doc",
"binary_version": "1.0.1f-1ubuntu2.15"
},
{
"binary_name": "libssl1.0.0",
"binary_version": "1.0.1f-1ubuntu2.15"
},
{
"binary_name": "libssl1.0.0-dbg",
"binary_version": "1.0.1f-1ubuntu2.15"
},
{
"binary_name": "libssl1.0.0-dbgsym",
"binary_version": "1.0.1f-1ubuntu2.15"
},
{
"binary_name": "libssl1.0.0-udeb",
"binary_version": "1.0.1f-1ubuntu2.15"
},
{
"binary_name": "libssl1.0.0-udeb-dbgsym",
"binary_version": "1.0.1f-1ubuntu2.15"
},
{
"binary_name": "openssl",
"binary_version": "1.0.1f-1ubuntu2.15"
},
{
"binary_name": "openssl-dbgsym",
"binary_version": "1.0.1f-1ubuntu2.15"
}
]
}