Login
Newsletter
Werbung

Sicherheit: Mangelnde Prüfung von Zertifikaten in jakarta-commons-httpclient
Aktuelle Meldungen Distributionen
Name: Mangelnde Prüfung von Zertifikaten in jakarta-commons-httpclient
ID: FEDORA-2013-1203
Distribution: Fedora
Plattformen: Fedora 18
Datum: Sa, 2. Februar 2013, 08:28
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5783
Applikationen: Apache HttpClient

Originalnachricht

Name        : jakarta-commons-httpclient
Product : Fedora 18
Version : 3.1
Release : 12.fc18
URL : http://jakarta.apache.org/commons/httpclient/
Summary : Jakarta Commons HTTPClient implements the client side of HTTP
standards
Description :
The Hyper-Text Transfer Protocol (HTTP) is perhaps the most significant
protocol used on the Internet today. Web services, network-enabled
appliances and the growth of network computing continue to expand the
role of the HTTP protocol beyond user-driven web browsers, and increase
the number of applications that may require HTTP support.
Although the java.net package provides basic support for accessing
resources via HTTP, it doesn't provide the full flexibility or
functionality needed by many applications. The Jakarta Commons HTTP
Client component seeks to fill this void by providing an efficient,
up-to-date, and feature-rich package implementing the client side of the
most recent HTTP standards and recommendations.
Designed for extension while providing robust support for the base HTTP
protocol, the HTTP Client component may be of interest to anyone
building HTTP-aware client applications such as web browsers, web
service clients, or systems that leverage or extend the HTTP protocol
for distributed communication.

-------------------------------------------------------------------------------
-
Update Information:

This update fixes a security vulnerability that caused
jakarta-commons-httpclient not to verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allowed man-in-the-middle attackers to spoof SSL servers via andaarbitrary valid certificate (CVE-2012-5783).
-------------------------------------------------------------------------------
-
ChangeLog:

* Mon Jan 21 2013 Mikolaj Izdebski <mizdebsk@redhat.com> - 1:3.1-12
- Add missing connection hostname check against X.509 certificate name
- Resolves: CVE-2012-5783
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #873317 - CVE-2012-5783 jakarta-commons-httpclient: missing
connection hostname check against X.509 certificate name
https://bugzilla.redhat.com/show_bug.cgi?id=873317
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update jakarta-commons-httpclient' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung