CERT-In Vulnerability Note
CIVN-2009-0124
Microsoft Windows CryptoAPI Integer Overflow Spoofing Vulnerabilities
Original Issue Date:October 15, 2009
Severity Rating: HIGH
Systems Affected
- Microsoft Windows 2000 Service Pack 4
- Windows XP Service Pack 2 and Windows XP Service Pack 3
- Windows XP Professional x64 Edition Service Pack 2
- Windows Server 2003 Service Pack 2
- Windows Server 2003 x64 Edition Service Pack 2
- Windows Server 2003 with SP2 for Itanium-based Systems
- Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2
- Windows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1, and Windows Vista x64 Edition Service Pack 2
- Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2
- Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2
- Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2
- Windows 7 for 32-bit Systems
- Windows 7 for x64-based Systems
- Windows Server 2008 R2 for x64-based Systems
- Windows Server 2008 R2 for Itanium-based Systems
Overview
Two vulnerabilities have been reported in Microsoft Crypto API that could allow a remote user to spoof certificates of arbitrary sites.
Description
1. X.509 Common Name Null Character Truncation Vulnerability
(
CVE-2009-2510
)
The vulnerability exists because the Windows CryptoAPI incorrectly parsing a null terminator in the Common Name object identifier while processing ASN.1 information from X.509 certificates. This could allow a remote user to create a certificate with a specially crafted Common Name field, resulting in a spoofing attack.
2. X.509 Integer Overflow Spoofing Vulnerability
(
CVE-2009-2511
)
This vulnerability is due to the integer overflow error in the Windows CryptoAPI when parsing ASN.1 object identifiers from X.509 certificates. This could allow a remote user to create a certificate with specially crafted ASN.1 values, that would be parsed incorrectly by the Windows CryptoAPI resulting in a spoofing attack.
Solution
Apply appropriate patch as mentioned in Microsoft Security Bulletin
MS09-056
Vendor Information
Microsoft
http://www.microsoft.com/technet/security/Bulletin/MS09-056.mspx
References
CISCO
http://tools.cisco.com/security/center/viewAlert.x?alertId=19157
http://tools.cisco.com/security/center/viewAlert.x?alertId=19158
SecurityTracker
http://securitytracker.com/alerts/2009/Oct/1023013.html
VUPEN
http://www.vupen.com/english/advisories/2009/2891
CVE Name
CVE-2009-2510
CVE-2009-2511
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-2436857
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|