Arch Linux Security Advisory ASA-201507-8
========================================
Severity: High
Date    : 2015-07-09
CVE-ID  : CVE-2015-1793
Package : openssl
Type    : man-in-the-middle
Remote  : Yes
Link    : https://wiki.archlinux.org/title/CVE

Summary
======
The package openssl before version 1.0.2.d-1 is vulnerable to
man-in-the-middle.

Resolution
=========
Upgrade to 1.0.2.d-1.

# pacman -Syu "openssl>=1.0.2.d-1"

The problem has been fixed upstream in version 1.0.2.d.

Workaround
=========
None.

Description
==========
During certificate verification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to be
bypassed, such as the CA flag, enabling them to use a valid leaf
certificate to act as a CA and "issue" an invalid certificate.

This issue will impact any application that verifies certificates
including SSL/TLS/DTLS clients and SSL/TLS/DTLS servers using client
authentication.

Impact
=====
A remote attacker is able to use a valid leaf certificate to act as a CA
and "issue" an invalid certificate that behaves valid to possibly
perform a man-in-the-middle attack.

References
=========
https://access.redhat.com/security/cve/CVE-2015-1793

ArchLinux: 201507-8: openssl: man-in-the-middle

July 9, 2015

Summary

During certificate verification, OpenSSL will attempt to find an alternative certificate chain if the first attempt to build such a chain fails. An error in the implementation of this logic can mean that an attacker could cause certain checks on untrusted certificates to be bypassed, such as the CA flag, enabling them to use a valid leaf certificate to act as a CA and "issue" an invalid certificate. This issue will impact any application that verifies certificates including SSL/TLS/DTLS clients and SSL/TLS/DTLS servers using client authentication.

Resolution

Upgrade to 1.0.2.d-1. # pacman -Syu "openssl>=1.0.2.d-1"
The problem has been fixed upstream in version 1.0.2.d.

References

https://access.redhat.com/security/cve/CVE-2015-1793

Severity
Package : openssl
Type : man-in-the-middle
Remote : Yes
Link : https://wiki.archlinux.org/title/CVE

Workaround

None.

Related News