Package: newpki-client
Severity: serious
Tags: security

Hi,

I was looking at return codes for applications making use of
openssl functions and found this:
src/DlgShowLog.cpp:   if(!LOG_ENTRY_verify(lValue, (EVP_PKEY 
*)m_EntityCert.GetPublicKey()))

LOG_ENTRY_verify() is a function from libnewpki that does:
#define LOG_ENTRY_verify(x,pkey) \
        ASN1_item_verify(LogEntryBody::get_ASN1_ITEM(), x->sig->sig_alg, 
x->sig->signature,(char *)x->body, pkey)

ASN1_item_verify() can return -1 in case the message digest type is
not known or there is an out of memory condition.

I have no idea if this can be a problem and what the security
implications are.

If the attacker can not specify the certificate that is being
used there probably isn't any serious problem.


Kurt




-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to