[v2.4] openssl: ASN1 BIO vulnerability (CVE-2012-2110)
A potentially exploitable vulnerability has been discovered in the
OpenSSL
function asn1_d2i_read_bio.
Any application which uses BIO or FILE based functions to read untrusted
DER
format data is vulnerable. Affected functions are of the form
d2i_*_bio or
d2i_*_fp, for example d2i_X509_bio or d2i_PKCS12_fp.
Applications using the memory based ASN1 functions (d2i_X509,
d2i_PKCS12 etc)
are not affected. In particular the SSL/TLS code of OpenSSL is not
affected.
Applications only using the PEM routines are not affected.
S/MIME or CMS applications using the built in MIME parser
SMIME_read_PKCS7 or
SMIME_read_CMS are affected.
The OpenSSL command line utility is also affected if used to process
untrusted
data in DER format.
Note: although an application using the SSL/TLS portions of OpenSSL is
not
automatically affected it might still call a function such as
d2i_X509_bio on
untrusted data and be vulnerable.
Thanks to Tavis Ormandy, Google Security Team, for discovering this
issue and
to Adam Langley <agl@chromium.org>for fixing it.
Affected users should upgrade to OpenSSL 1.0.1a, 1.0.0i or 0.9.8v.
References
URL for this Security Advisory:
http://www.openssl.org/news/secadv\_20120419.txt
(from redmine: issue id 1107, created on 2012-04-20, closed on 2012-05-03)
- Changesets:
- Revision 75d80e98 by Natanael Copa on 2012-04-23T07:13:56Z:
main/openssl: security upgrade to 1.0.1a (CVE-2012-2110)
fixes #1107