SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  OpenSSL X.509 Name Constraint Check Buffer Overflow 2

Category: WEB-TLS      

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution.

References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1259


Relevant Information