diff options
author | Dr. Stephen Henson <steve@openssl.org> | 2013-01-24 13:30:42 +0000 |
---|---|---|
committer | Dr. Stephen Henson <steve@openssl.org> | 2013-01-29 16:49:24 +0000 |
commit | 62e4506a7d4cec1c8e1ff687f6b220f6a62a57c7 (patch) | |
tree | 15fb8fedf8e52fb1f7e2d8f0b1a790911a91ce54 | |
parent | 014265eb02e26f35c8db58e2ccbf100b0b2f0072 (diff) | |
download | openssl-new-62e4506a7d4cec1c8e1ff687f6b220f6a62a57c7.tar.gz |
Don't try and verify signatures if key is NULL (CVE-2013-0166)
Add additional check to catch this in ASN1_item_verify too.
-rw-r--r-- | CHANGES | 4 | ||||
-rw-r--r-- | crypto/asn1/a_verify.c | 6 | ||||
-rw-r--r-- | crypto/ocsp/ocsp_vfy.c | 9 |
3 files changed, 16 insertions, 3 deletions
@@ -4,6 +4,10 @@ Changes between 1.0.1c and 1.0.1d [xx XXX xxxx] + *) Return an error when checking OCSP signatures when key is NULL. + This fixes a DoS attack. (CVE-2013-0166) + [Steve Henson] + *) Make openssl verify return errors. [Chris Palmer <palmer@google.com> and Ben Laurie] diff --git a/crypto/asn1/a_verify.c b/crypto/asn1/a_verify.c index 432722e409..fc84cd3d19 100644 --- a/crypto/asn1/a_verify.c +++ b/crypto/asn1/a_verify.c @@ -140,6 +140,12 @@ int ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a, int mdnid, pknid; + if (!pkey) + { + ASN1err(ASN1_F_ASN1_ITEM_VERIFY, ERR_R_PASSED_NULL_PARAMETER); + return -1; + } + EVP_MD_CTX_init(&ctx); /* Convert signature OID into digest and public key OIDs */ diff --git a/crypto/ocsp/ocsp_vfy.c b/crypto/ocsp/ocsp_vfy.c index 8a5e788d96..276718304d 100644 --- a/crypto/ocsp/ocsp_vfy.c +++ b/crypto/ocsp/ocsp_vfy.c @@ -91,9 +91,12 @@ int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs, { EVP_PKEY *skey; skey = X509_get_pubkey(signer); - ret = OCSP_BASICRESP_verify(bs, skey, 0); - EVP_PKEY_free(skey); - if(ret <= 0) + if (skey) + { + ret = OCSP_BASICRESP_verify(bs, skey, 0); + EVP_PKEY_free(skey); + } + if(!skey || ret <= 0) { OCSPerr(OCSP_F_OCSP_BASIC_VERIFY, OCSP_R_SIGNATURE_FAILURE); goto end; |