drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Prüfung von Zertifikaten in jakarta-commons-httpclient
Name: |
Mangelnde Prüfung von Zertifikaten in jakarta-commons-httpclient |
|
ID: |
FEDORA-2013-1203 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 18 |
|
Datum: |
Sa, 2. Februar 2013, 08:28 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5783 |
|
Applikationen: |
Apache HttpClient |
|
Originalnachricht |
Name : jakarta-commons-httpclient Product : Fedora 18 Version : 3.1 Release : 12.fc18 URL : http://jakarta.apache.org/commons/httpclient/ Summary : Jakarta Commons HTTPClient implements the client side of HTTP standards Description : The Hyper-Text Transfer Protocol (HTTP) is perhaps the most significant protocol used on the Internet today. Web services, network-enabled appliances and the growth of network computing continue to expand the role of the HTTP protocol beyond user-driven web browsers, and increase the number of applications that may require HTTP support. Although the java.net package provides basic support for accessing resources via HTTP, it doesn't provide the full flexibility or functionality needed by many applications. The Jakarta Commons HTTP Client component seeks to fill this void by providing an efficient, up-to-date, and feature-rich package implementing the client side of the most recent HTTP standards and recommendations. Designed for extension while providing robust support for the base HTTP protocol, the HTTP Client component may be of interest to anyone building HTTP-aware client applications such as web browsers, web service clients, or systems that leverage or extend the HTTP protocol for distributed communication.
------------------------------------------------------------------------------- - Update Information:
This update fixes a security vulnerability that caused jakarta-commons-httpclient not to verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allowed man-in-the-middle attackers to spoof SSL servers via andaarbitrary valid certificate (CVE-2012-5783). ------------------------------------------------------------------------------- - ChangeLog:
* Mon Jan 21 2013 Mikolaj Izdebski <mizdebsk@redhat.com> - 1:3.1-12 - Add missing connection hostname check against X.509 certificate name - Resolves: CVE-2012-5783 ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #873317 - CVE-2012-5783 jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name https://bugzilla.redhat.com/show_bug.cgi?id=873317 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update jakarta-commons-httpclient' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|