Login
Newsletter
Werbung

Sicherheit: Mangelnde Prüfung von Zertifikaten in liblwp-protocol-https-perl
Aktuelle Meldungen Distributionen
Name: Mangelnde Prüfung von Zertifikaten in liblwp-protocol-https-perl
ID: USN-2292-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS
Datum: Do, 17. Juli 2014, 23:01
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3230
Applikationen: liblwp-protocol-https-perl

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============0137024688415219189==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="9hFanI9t9fEiloEc855Qrrv5QlLxBGhTK"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--9hFanI9t9fEiloEc855Qrrv5QlLxBGhTK
Content-Type: text/plain; charset=UTF-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-2292-1
July 17, 2014

liblwp-protocol-https-perl vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS

Summary:

LWP::Protocol::https could be made to expose sensitive information over the
network.

Software Description:
- liblwp-protocol-https-perl: HTTPS driver for LWP::UserAgent

Details:

It was discovered that the LWP::Protocol::https perl module incorrectly
disabled peer certificate verification completely when only hostname
verification was requested to be disabled. If a remote attacker were able
to perform a man-in-the-middle attack, this flaw could possibly be
exploited in certain scenarios to alter or compromise confidential
information in applications that used the LWP::Protocol::https module.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
liblwp-protocol-https-perl 6.04-2ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2292-1
CVE-2014-3230

Package Information:
https://launchpad.net/ubuntu/+source/liblwp-protocol-https-perl/6.04-2ubuntu0.1



--9hFanI9t9fEiloEc855Qrrv5QlLxBGhTK
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=qTWT
-----END PGP SIGNATURE-----

--9hFanI9t9fEiloEc855Qrrv5QlLxBGhTK--


--===============0137024688415219189==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============0137024688415219189==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung