Vulnerability Details : CVE-2009-0591
The CMS_verify function in OpenSSL 0.9.8h through 0.9.8j, when CMS is enabled, does not properly handle errors associated with malformed signed attributes, which allows remote attackers to repudiate a signature that originally appeared to be valid but was actually invalid.
Vulnerability category: BypassGain privilege
Products affected by CVE-2009-0591
- cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-0591
0.79%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 79 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-0591
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.6
|
LOW | AV:N/AC:H/Au:N/C:N/I:P/A:N |
4.9
|
2.9
|
NIST |
CWE ids for CVE-2009-0591
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2009-0591
-
Red Hat 2009-03-30Not vulnerable. This issue affected OpenSSL CMS functionality which is not present in the openssl packages as shipped with Red Hat Enterprise Linux 2.1, 3, 4 or 5.
References for CVE-2009-0591
-
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2009:010 - openSUSE Security Announce - openSUSE Mailing Lists
-
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-008.txt.asc
-
http://marc.info/?l=bugtraq&m=124464882609472&w=2
'[security bulletin] HPSBUX02435 SSRT090059 rev.1 - HP-UX Running OpenSSL, Remote Denial of Service (' - MARC
-
http://www.openssl.org/news/secadv_20090325.txt
404 Page not found | LibraryVendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/49432
-
http://sourceforge.net/project/shownotes.php?release_id=671059&group_id=116847
VooDoo cIRCle download | SourceForge.net
-
http://www.securityfocus.com/bid/34256
-
http://voodoo-circle.sourceforge.net/sa/sa-20090326-01.html
VooDoo cIRCle security advisory 20090326-01Vendor Advisory
-
http://www.php.net/archive/2009.php#id2009-04-08-1
PHP: News Archive - 2009
-
http://www.vupen.com/english/advisories/2009/1548
Site en construction
-
http://marc.info/?l=bugtraq&m=127678688104458&w=2
'[security bulletin] HPSBOV02540 SSRT090249 rev.1 - HP SSL for OpenVMS, Remote Unauthorized Data Inje' - MARC
-
https://kb.bluecoat.com/index?page=content&id=SA50
-
http://support.apple.com/kb/HT3865
About Security Update 2009-005 - Apple Support
-
http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html
-
http://www.vupen.com/english/advisories/2009/1175
Site en construction
-
http://www.vupen.com/english/advisories/2009/0850
Site en constructionVendor Advisory
-
http://securitytracker.com/id?1021907
-
http://www.vupen.com/english/advisories/2009/1020
Site en construction
Jump to