CVE-2008-5077
Detail
Not Scheduled
This CVE record is not being prioritized for NVD enrichment efforts due to resource or other concerns.
Current Description
OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.
View Analysis Description
Analysis
Description
OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature.
Metrics
CVSS Version 4.0
CVSS Version 3.x
CVSS Version 2.0
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
CVSS 4.0 Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 3.x Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 2.0 Severity and Vector Strings:
Vector:
(AV:N/AC:M/Au:N/C:N/I:P/A:P)
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to [email protected] .
URL
Source(s)
Tag(s)
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
CVE, Inc., Red Hat
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html
CVE, Inc., Red Hat
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html
CVE, Inc., Red Hat
http://marc.info/?l=bugtraq&m=123859864430555&w=2
CVE, Inc., Red Hat
http://marc.info/?l=bugtraq&m=124277349419254&w=2
CVE, Inc., Red Hat
http://marc.info/?l=bugtraq&m=127678688104458&w=2
CVE, Inc., Red Hat
http://secunia.com/advisories/33338
CVE, Inc., Red Hat
Vendor Advisory
http://secunia.com/advisories/33394
CVE, Inc., Red Hat
http://secunia.com/advisories/33436
CVE, Inc., Red Hat
Vendor Advisory
http://secunia.com/advisories/33557
CVE, Inc., Red Hat
Vendor Advisory
http://secunia.com/advisories/33673
CVE, Inc., Red Hat
Vendor Advisory
http://secunia.com/advisories/33765
CVE, Inc., Red Hat
Vendor Advisory
http://secunia.com/advisories/34211
CVE, Inc., Red Hat
Vendor Advisory
http://secunia.com/advisories/35074
CVE, Inc., Red Hat
Vendor Advisory
http://secunia.com/advisories/35108
CVE, Inc., Red Hat
Vendor Advisory
http://secunia.com/advisories/39005
CVE, Inc., Red Hat
Vendor Advisory
http://security.gentoo.org/glsa/glsa-200902-02.xml
CVE, Inc., Red Hat
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.544796
CVE, Inc., Red Hat
http://sunsolve.sun.com/search/document.do?assetkey=1-66-250826-1
CVE, Inc., Red Hat
http://support.apple.com/kb/HT3549
CVE, Inc., Red Hat
http://support.avaya.com/elmodocs2/security/ASA-2009-038.htm
CVE, Inc., Red Hat
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=837653
CVE, Inc., Red Hat
http://voodoo-circle.sourceforge.net/sa/sa-20090123-01.html
CVE, Inc., Red Hat
http://www.ocert.org/advisories/ocert-2008-016.html
CVE, Inc., Red Hat
http://www.openssl.org/news/secadv_20090107.txt
CVE, Inc., Red Hat
http://www.redhat.com/support/errata/RHSA-2009-0004.html
CVE, Inc., Red Hat
http://www.securityfocus.com/archive/1/499827/100/0/threaded
CVE, Inc., Red Hat
http://www.securityfocus.com/archive/1/502322/100/0/threaded
CVE, Inc., Red Hat
http://www.securityfocus.com/bid/33150
CVE, Inc., Red Hat
http://www.securitytracker.com/id?1021523
CVE, Inc., Red Hat
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
CVE, Inc., Red Hat
US Government Resource
http://www.vmware.com/security/advisories/VMSA-2009-0004.html
CVE, Inc., Red Hat
http://www.vupen.com/english/advisories/2009/0040
CVE, Inc., Red Hat
Vendor Advisory
http://www.vupen.com/english/advisories/2009/0289
CVE, Inc., Red Hat
Vendor Advisory
http://www.vupen.com/english/advisories/2009/0362
CVE, Inc., Red Hat
Vendor Advisory
http://www.vupen.com/english/advisories/2009/0558
CVE, Inc., Red Hat
Vendor Advisory
http://www.vupen.com/english/advisories/2009/0904
CVE, Inc., Red Hat
Vendor Advisory
http://www.vupen.com/english/advisories/2009/0913
CVE, Inc., Red Hat
Vendor Advisory
http://www.vupen.com/english/advisories/2009/1297
CVE, Inc., Red Hat
Vendor Advisory
http://www.vupen.com/english/advisories/2009/1338
CVE, Inc., Red Hat
Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6380
CVE, Inc., Red Hat
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9155
CVE, Inc., Red Hat
https://usn.ubuntu.com/704-1/
CVE, Inc., Red Hat
Weakness Enumeration
CWE-ID
CWE Name
Source
CWE-20
Improper Input Validation
NIST
Change History
8 change records found show changes
CVE Modified by CVE 11/20/2024 7:53:14 PM
Action
Type
Old Value
New Value
Added
Reference
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html
Added
Reference
http://marc.info/?l=bugtraq&m=123859864430555&w=2
Added
Reference
http://marc.info/?l=bugtraq&m=123859864430555&w=2
Added
Reference
http://marc.info/?l=bugtraq&m=124277349419254&w=2
Added
Reference
http://marc.info/?l=bugtraq&m=124277349419254&w=2
Added
Reference
http://marc.info/?l=bugtraq&m=127678688104458&w=2
Added
Reference
http://secunia.com/advisories/33338
Added
Reference
http://secunia.com/advisories/33394
Added
Reference
http://secunia.com/advisories/33436
Added
Reference
http://secunia.com/advisories/33557
Added
Reference
http://secunia.com/advisories/33673
Added
Reference
http://secunia.com/advisories/33765
Added
Reference
http://secunia.com/advisories/34211
Added
Reference
http://secunia.com/advisories/35074
Added
Reference
http://secunia.com/advisories/35108
Added
Reference
http://secunia.com/advisories/39005
Added
Reference
http://security.gentoo.org/glsa/glsa-200902-02.xml
Added
Reference
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.544796
Added
Reference
http://sunsolve.sun.com/search/document.do?assetkey=1-66-250826-1
Added
Reference
http://support.apple.com/kb/HT3549
Added
Reference
http://support.avaya.com/elmodocs2/security/ASA-2009-038.htm
Added
Reference
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=837653
Added
Reference
http://voodoo-circle.sourceforge.net/sa/sa-20090123-01.html
Added
Reference
http://www.ocert.org/advisories/ocert-2008-016.html
Added
Reference
http://www.openssl.org/news/secadv_20090107.txt
Added
Reference
http://www.redhat.com/support/errata/RHSA-2009-0004.html
Added
Reference
http://www.securityfocus.com/archive/1/499827/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/502322/100/0/threaded
Added
Reference
http://www.securityfocus.com/bid/33150
Added
Reference
http://www.securitytracker.com/id?1021523
Added
Reference
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
Added
Reference
http://www.vmware.com/security/advisories/VMSA-2009-0004.html
Added
Reference
http://www.vupen.com/english/advisories/2009/0040
Added
Reference
http://www.vupen.com/english/advisories/2009/0289
Added
Reference
http://www.vupen.com/english/advisories/2009/0362
Added
Reference
http://www.vupen.com/english/advisories/2009/0558
Added
Reference
http://www.vupen.com/english/advisories/2009/0904
Added
Reference
http://www.vupen.com/english/advisories/2009/0913
Added
Reference
http://www.vupen.com/english/advisories/2009/1297
Added
Reference
http://www.vupen.com/english/advisories/2009/1338
Added
Reference
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6380
Added
Reference
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9155
Added
Reference
https://usn.ubuntu.com/704-1/
CVE Modified by Red Hat, Inc. 5/13/2024 9:58:36 PM
Action
Type
Old Value
New Value
CVE Modified by Red Hat, Inc. 10/11/2018 4:53:40 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.securityfocus.com/archive/1/499827/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/502322/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/499827/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/502322/100/0/threaded [No Types Assigned]
CVE Modified by Red Hat, Inc. 10/03/2018 5:56:06 PM
Action
Type
Old Value
New Value
Added
Reference
https://usn.ubuntu.com/704-1/ [No Types Assigned]
Removed
Reference
http://www.ubuntulinux.org/support/documentation/usn/usn-704-1 [No Types Assigned]
CVE Modified by Red Hat, Inc. 9/28/2017 9:32:28 PM
Action
Type
Old Value
New Value
Added
Reference
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6380 [No Types Assigned]
Added
Reference
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9155 [No Types Assigned]
Removed
Reference
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6380 [No Types Assigned]
Removed
Reference
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9155 [No Types Assigned]
CVE Translated by NIST 8/23/2016 5:45:00 AM
Action
Type
Old Value
New Value
Added
Translation
OpenSSL 0.9.8i y versiones anteriores no comprueba correctamente el valor de retorno de la función EVP_VerifyFinal, lo que permite a atacantes remotos evitar la validación de la cadena del certificado a través de una firma SSL/TLS mal formada para las claves DSA y ECDSA.
Removed
Translation
OpenSSL 0.9.8i y anteriores no conprueba correctamente el valor de retorno de la función EVP_VerifyFinal, lo que permite a atacantes remotos evitar la validación de la cadena del certificado mediante una firma SSL/TLS mal formada.
CVE Modified by Red Hat, Inc. 8/22/2016 9:59:08 PM
Action
Type
Old Value
New Value
Added
Reference
http://marc.info/?l=bugtraq&m=127678688104458&w=2
Initial CVE Analysis 1/07/2009 2:40:00 PM
Action
Type
Old Value
New Value
Quick Info
CVE Dictionary Entry: CVE-2008-5077 NVD
Published Date: 01/07/2009 NVD
Last Modified: 04/08/2025
Source: Red Hat, Inc.