Package: newpki-client
Severity: serious
Tags: security
Hi,
I was looking at return codes for applications making use of
openssl functions and found this:
src/DlgShowLog.cpp: if(!LOG_ENTRY_verify(lValue, (EVP_PKEY
*)m_EntityCert.GetPublicKey()))
LOG_ENTRY_verify() is a function from libnewpki that does:
#define LOG_ENTRY_verify(x,pkey) \
ASN1_item_verify(LogEntryBody::get_ASN1_ITEM(), x->sig->sig_alg,
x->sig->signature,(char *)x->body, pkey)
ASN1_item_verify() can return -1 in case the message digest type is
not known or there is an out of memory condition.
I have no idea if this can be a problem and what the security
implications are.
If the attacker can not specify the certificate that is being
used there probably isn't any serious problem.
Kurt
--
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]