Unrated severityNVD Advisory· Published Jan 15, 2009· Updated Apr 23, 2026
CVE-2009-0126
CVE-2009-0126
Description
The decrypt_public function in lib/crypt.cpp in the client in Berkeley Open Infrastructure for Network Computing (BOINC) 6.2.14 and 6.4.5 does not check the return value from the OpenSSL RSA_public_decrypt function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.
Affected products
2cpe:2.3:a:berkeley:boinc_client:6.2.14:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:berkeley:boinc_client:6.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:berkeley:boinc_client:6.4.5:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- bugs.debian.org/cgi-bin/bugreport.cginvdExploit
- bugzilla.redhat.com/show_bug.cginvdExploit
- boinc.berkeley.edu/trac/ticket/823nvdVendor Advisory
- boinc.berkeley.edu/trac/changeset/16883nvd
- lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.htmlnvd
- openwall.com/lists/oss-security/2009/01/12/4nvd
- secunia.com/advisories/33806nvd
- secunia.com/advisories/33828nvd
- www.redhat.com/archives/fedora-package-announce/2009-February/msg00034.htmlnvd
News mentions
0No linked articles in our index yet.