The libCheckSignature function in crypto-utils.lib for OpenCA 0.9.1.6 and earlier only compares the serial of the signer's certificate and the one in the database, which can cause OpenCA to incorrectly accept a signature if the certificate's chain is trusted by OpenCA's chain directory, allowing remote attackers to spoof requests from other users.
References
Link | Resource |
---|---|
http://www.openca.org/news/CAN-2004-0004.txt | Patch Vendor Advisory |
http://www.securityfocus.com/bid/9435 | Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/336446 | US Government Resource |
http://www.osvdb.org/3615 | |
http://marc.info/?l=bugtraq&m=107427313700554&w=2 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/14847 |
Configurations
Information
Published : 2004-02-16 21:00
Updated : 2017-10-09 18:30
NVD link : CVE-2004-0004
Mitre link : CVE-2004-0004
JSON object : View
CWE
Products Affected
openca
- openca