One way to exploit this flaw would be for a remote attacker who is in
control of a malicious server or who can use a 'man in the middle'
attack to present a malformed SSL/TLS signature from a certificate chain
to a vulnerable client, bypassing validation.

In my opinion, this statement is not very clear. After reading the advisory, I was under the impression that the validation of the DSA/ECDSA signature of the SSL/TLS server certificate could be bypassed.

After looking into the code more closely, I am pretty confident that this is not possible. However, I do realize that the validation of the signatures in the SSL/TLS protocol messages can be bypassed, possibly allowing an attacker to take part in the key exchange process.

Are these assumptions correct?

Thanks.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to