{ "id": "CVE-2009-0021", "sourceIdentifier": "secalert@redhat.com", "published": "2009-01-07T17:30:00.360", "lastModified": "2018-10-11T20:58:43.337", "vulnStatus": "Modified", "evaluatorComment": "Note that versions 4.2.5 before 4.2.5p150 are development versions and not production versions. Development versions are not included in the CPE configuration for CVEs.", "descriptions": [ { "lang": "en", "value": "NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077." }, { "lang": "es", "value": "NTP versiones 4.2.4 anteriores a 4.2.4p5 y versiones 4.2.5 anteriores a 4.2.5p150, no comprueba apropiadamente el valor devuelto de la funci\u00f3n EVP_VerifyFinal de OpenSSL, que permite a los atacantes remotos omitir la comprobaci\u00f3n de la cadena de certificados por medio de una firma de SSL/TLS malformada para las claves DSA y ECDSA, una vulnerabilidad similar a CVE-2008-5077." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-287" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "versionEndIncluding": "4.2.4p4", "matchCriteriaId": "94D9BEE4-25C2-4147-B075-50F46113F59E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ntp:ntp:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "088BFFA4-1AAB-4699-9793-F731A81B296A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ntp:ntp:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3475779-383A-4128-9145-474EC08030FE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ntp:ntp:4.2.4p1:*:*:*:*:*:*:*", "matchCriteriaId": "B980A178-2958-4B36-8AD8-3932B12C5A72" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ntp:ntp:4.2.4p2:*:*:*:*:*:*:*", "matchCriteriaId": "5D65210A-F80E-4019-91DA-49838369E03F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ntp:ntp:4.2.4p3:*:*:*:*:*:*:*", "matchCriteriaId": "29FAB224-3493-4273-A655-10BE44F5B5BE" } ] } ] } ], "references": [ { "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html", "source": "secalert@redhat.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html", "source": "secalert@redhat.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html", "source": "secalert@redhat.com" }, { "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.531177", "source": "secalert@redhat.com" }, { "url": "http://support.apple.com/kb/HT3549", "source": "secalert@redhat.com" }, { "url": "http://www.ocert.org/advisories/ocert-2008-016.html", "source": "secalert@redhat.com" }, { "url": "http://www.redhat.com/support/errata/RHSA-2009-0046.html", "source": "secalert@redhat.com" }, { "url": "http://www.securityfocus.com/archive/1/499827/100/0/threaded", "source": "secalert@redhat.com" }, { "url": "http://www.securitytracker.com/id?1021533", "source": "secalert@redhat.com" }, { "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html", "source": "secalert@redhat.com", "tags": [ "US Government Resource" ] }, { "url": "http://www.vupen.com/english/advisories/2009/0042", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2009/1297", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "https://lists.ntp.org/pipermail/announce/2009-January/000055.html", "source": "secalert@redhat.com" }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10035", "source": "secalert@redhat.com" } ] }