The X509verifycert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certificate verifications via a valid leaf certificate.
{ "binaries": [ { "binary_name": "libcrypto1.0.0-udeb", "binary_version": "1.0.1f-1ubuntu2.15" }, { "binary_name": "libcrypto1.0.0-udeb-dbgsym", "binary_version": "1.0.1f-1ubuntu2.15" }, { "binary_name": "libssl-dev", "binary_version": "1.0.1f-1ubuntu2.15" }, { "binary_name": "libssl-dev-dbgsym", "binary_version": "1.0.1f-1ubuntu2.15" }, { "binary_name": "libssl-doc", "binary_version": "1.0.1f-1ubuntu2.15" }, { "binary_name": "libssl1.0.0", "binary_version": "1.0.1f-1ubuntu2.15" }, { "binary_name": "libssl1.0.0-dbg", "binary_version": "1.0.1f-1ubuntu2.15" }, { "binary_name": "libssl1.0.0-dbgsym", "binary_version": "1.0.1f-1ubuntu2.15" }, { "binary_name": "libssl1.0.0-udeb", "binary_version": "1.0.1f-1ubuntu2.15" }, { "binary_name": "libssl1.0.0-udeb-dbgsym", "binary_version": "1.0.1f-1ubuntu2.15" }, { "binary_name": "openssl", "binary_version": "1.0.1f-1ubuntu2.15" }, { "binary_name": "openssl-dbgsym", "binary_version": "1.0.1f-1ubuntu2.15" } ], "availability": "No subscription required" }