The X509verifycert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certificate verifications via a valid leaf certificate.
{
"binaries": [
{
"binary_version": "1.0.1f-1ubuntu2.15",
"binary_name": "libcrypto1.0.0-udeb"
},
{
"binary_version": "1.0.1f-1ubuntu2.15",
"binary_name": "libcrypto1.0.0-udeb-dbgsym"
},
{
"binary_version": "1.0.1f-1ubuntu2.15",
"binary_name": "libssl-dev"
},
{
"binary_version": "1.0.1f-1ubuntu2.15",
"binary_name": "libssl-dev-dbgsym"
},
{
"binary_version": "1.0.1f-1ubuntu2.15",
"binary_name": "libssl-doc"
},
{
"binary_version": "1.0.1f-1ubuntu2.15",
"binary_name": "libssl1.0.0"
},
{
"binary_version": "1.0.1f-1ubuntu2.15",
"binary_name": "libssl1.0.0-dbg"
},
{
"binary_version": "1.0.1f-1ubuntu2.15",
"binary_name": "libssl1.0.0-dbgsym"
},
{
"binary_version": "1.0.1f-1ubuntu2.15",
"binary_name": "libssl1.0.0-udeb"
},
{
"binary_version": "1.0.1f-1ubuntu2.15",
"binary_name": "libssl1.0.0-udeb-dbgsym"
},
{
"binary_version": "1.0.1f-1ubuntu2.15",
"binary_name": "openssl"
},
{
"binary_version": "1.0.1f-1ubuntu2.15",
"binary_name": "openssl-dbgsym"
}
],
"availability": "No subscription required"
}