CVE-2009-0126

NameCVE-2009-0126
DescriptionThe decrypt_public function in lib/crypt.cpp in the client in Berkeley Open Infrastructure for Network Computing (BOINC) 6.2.14 and 6.4.5 does not check the return value from the OpenSSL RSA_public_decrypt function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-1718-1
Debian Bugs511521

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
boinc (PTS)buster7.14.2+dfsg-3fixed
bullseye7.16.16+dfsg-1fixed
bookworm7.20.5+dfsg-1.1fixed
trixie7.24.1+dfsg-2fixed
sid7.24.1+dfsg-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
boincsourceetch5.4.11-4+etch1DSA-1718-1
boincsource(unstable)6.2.14-3511521

Search for package or bug name: Reporting problems