Unrated severityNVD Advisory· Published Jan 7, 2009· Updated Apr 23, 2026
CVE-2008-5077
CVE-2008-5077
Description
OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.
Affected products
59cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*+ 58 more
- cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*range: <=0.9.8h
- cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
43- secunia.com/advisories/33338nvdVendor Advisory
- secunia.com/advisories/33436nvdVendor Advisory
- secunia.com/advisories/33557nvdVendor Advisory
- secunia.com/advisories/33673nvdVendor Advisory
- secunia.com/advisories/33765nvdVendor Advisory
- secunia.com/advisories/34211nvdVendor Advisory
- secunia.com/advisories/35074nvdVendor Advisory
- secunia.com/advisories/35108nvdVendor Advisory
- secunia.com/advisories/39005nvdVendor Advisory
- www.vupen.com/english/advisories/2009/0040nvdVendor Advisory
- www.vupen.com/english/advisories/2009/0289nvdVendor Advisory
- www.vupen.com/english/advisories/2009/0362nvdVendor Advisory
- www.vupen.com/english/advisories/2009/0558nvdVendor Advisory
- www.vupen.com/english/advisories/2009/0904nvdVendor Advisory
- www.vupen.com/english/advisories/2009/0913nvdVendor Advisory
- www.vupen.com/english/advisories/2009/1297nvdVendor Advisory
- www.vupen.com/english/advisories/2009/1338nvdVendor Advisory
- www.us-cert.gov/cas/techalerts/TA09-133A.htmlnvdUS Government Resource
- lists.apple.com/archives/security-announce/2009/May/msg00002.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.htmlnvd
- marc.infonvd
- marc.infonvd
- marc.infonvd
- secunia.com/advisories/33394nvd
- security.gentoo.org/glsa/glsa-200902-02.xmlnvd
- slackware.com/security/viewer.phpnvd
- sunsolve.sun.com/search/document.donvd
- support.apple.com/kb/HT3549nvd
- support.avaya.com/elmodocs2/security/ASA-2009-038.htmnvd
- support.nortel.com/go/main.jspnvd
- voodoo-circle.sourceforge.net/sa/sa-20090123-01.htmlnvd
- www.ocert.org/advisories/ocert-2008-016.htmlnvd
- www.openssl.org/news/secadv_20090107.txtnvd
- www.redhat.com/support/errata/RHSA-2009-0004.htmlnvd
- www.securityfocus.com/archive/1/499827/100/0/threadednvd
- www.securityfocus.com/archive/1/502322/100/0/threadednvd
- www.securityfocus.com/bid/33150nvd
- www.securitytracker.com/idnvd
- www.vmware.com/security/advisories/VMSA-2009-0004.htmlnvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6380nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9155nvd
- usn.ubuntu.com/704-1/nvd
News mentions
0No linked articles in our index yet.