The X509verifycert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certificate verifications via a valid leaf certificate.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "libssl1.0.0-udeb-dbgsym": "1.0.1f-1ubuntu2.15", "libssl-dev": "1.0.1f-1ubuntu2.15", "libssl1.0.0": "1.0.1f-1ubuntu2.15", "libssl-doc": "1.0.1f-1ubuntu2.15", "libcrypto1.0.0-udeb-dbgsym": "1.0.1f-1ubuntu2.15", "libssl1.0.0-dbg": "1.0.1f-1ubuntu2.15", "libssl-dev-dbgsym": "1.0.1f-1ubuntu2.15", "openssl": "1.0.1f-1ubuntu2.15", "openssl-dbgsym": "1.0.1f-1ubuntu2.15", "libssl1.0.0-udeb": "1.0.1f-1ubuntu2.15", "libssl1.0.0-dbgsym": "1.0.1f-1ubuntu2.15", "libcrypto1.0.0-udeb": "1.0.1f-1ubuntu2.15" } ] }