Vigil@nce: OpenSSL, information disclosure via EVP_PKEY_verifyrecover
June 2010 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/
SYNTHESIS OF THE VULNERABILITY
When an application uses EVP_PKEY_verifyrecover(), an attacker can
obtain information.
– Severity: 1/4
– Creation date: 02/06/2010
DESCRIPTION OF THE VULNERABILITY
The OpenSSL EVP_PKEY_verify_recover()/EVP_PKEY_verifyrecover()
function is used to recover signed data.
When an error occurs, in the int_rsa_verify() function in mode
RSA_PKCS1_PADDING, the pkey_rsa_verifyrecover() function does not
iniatialize the error message size. A memory fragment is thus
returned.
When an application uses EVP_PKEY_verifyrecover(), an attacker can
therefore obtain information. Currently, the only known vulnerable
application is "pkeyutl".
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/OpenSSL-information-disclosure-via-EVP-PKEY-verifyrecover-9681