CVE-2009-0126

NameCVE-2009-0126
DescriptionThe decrypt_public function in lib/crypt.cpp in the client in Berkeley Open Infrastructure for Network Computing (BOINC) 6.2.14 and 6.4.5 does not check the return value from the OpenSSL RSA_public_decrypt function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, more)
ReferencesDSA-1718-1
NVD severitymedium (attack range: remote)
Debian Bugs511521
Debian/oldstablenot vulnerable.
Debian/stablenot vulnerable.
Debian/testingnot vulnerable.
Debian/unstablenot vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
boinc (PTS)squeeze6.10.58+dfsg-3fixed
wheezy7.0.27+dfsg-5fixed
jessie7.4.23+dfsg-1fixed
sid7.4.23+dfsg-2fixed

The information above is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
boincsource(unstable)6.2.14-3medium511521
boincsourceetch5.4.11-4+etch1mediumDSA-1718-1

Search for package or bug name: Reporting problems