drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Prüfung von Zertifikaten in liblwp-protocol-https-perl
Name: |
Mangelnde Prüfung von Zertifikaten in liblwp-protocol-https-perl |
|
ID: |
USN-2292-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 14.04 LTS |
|
Datum: |
Do, 17. Juli 2014, 23:01 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3230 |
|
Applikationen: |
liblwp-protocol-https-perl |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============0137024688415219189== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="9hFanI9t9fEiloEc855Qrrv5QlLxBGhTK"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --9hFanI9t9fEiloEc855Qrrv5QlLxBGhTK Content-Type: text/plain; charset=UTF- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-2292-1 July 17, 2014
liblwp-protocol-https-perl vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
LWP::Protocol::https could be made to expose sensitive information over the network.
Software Description: - liblwp-protocol-https-perl: HTTPS driver for LWP::UserAgent
Details:
It was discovered that the LWP::Protocol::https perl module incorrectly disabled peer certificate verification completely when only hostname verification was requested to be disabled. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could possibly be exploited in certain scenarios to alter or compromise confidential information in applications that used the LWP::Protocol::https module.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04 LTS: liblwp-protocol-https-perl 6.04-2ubuntu0.1
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2292-1 CVE-2014-3230
Package Information: https://launchpad.net/ubuntu/+source/liblwp-protocol-https-perl/6.04-2ubuntu0.1
--9hFanI9t9fEiloEc855Qrrv5QlLxBGhTK Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1 Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
iQIcBAEBCgAGBQJTyA0SAAoJEGVp2FWnRL6TBBwQAIbyrMHI5pgMMBz1fIzKAX7q NT0xfxENYoC7rwvk93ZtuMVhHJzHXZrRTYnPcswYOn/9n2PRDA13crGiIAM38p47 hjsCOjd/IeJzZhFyGftcOpDzohjY5wh64kc+juudSL+zl0e5JU8ade7QsWVnHoJe Z53RqYrOk1mB27mBpCkW7ImCWSR8z9FMccKW8ixI87PvNVzPmr8OAOZFMMO0mJvH Wm9jp5YVQCKVTYOBndeY+bmhkYATYwbNBVT+NChlUE12J3o03L8AQ924Llw4Q3fo 0e/l/k64715TMv9NOL72V85T0JLCLN8YD/1GY7GiSdobNdfeaTNdf8moje0DmYhD TODQVjfAcl2cDMPmXk2tnBEPwfLYBV7OO+S0y7yXwSsv3Uct1TMZ+3+ZlAwlJeAY scr0oj3Txk8clmtNzWfL2AaNavBL8Eozo3hibCjiWJp+a7QfVoFG0AUjx4hOh/CS ZSGbEpRaaQ/xg4hrXAnEW70LQWBws3Q1kikJkHMog2gNRdudb2j+E0Fid6hkDZQm cEFthDvHe/vkVPhmTl16hSoG0XiutP5sRlJUPArQb89iysoSaEnPR782cdpJTWlP MU5Lc/GgCnJfv3AWGhuUPfXMQ79AflJenVRiOgvIcSHf4kSd+5FvgIYROytVVbeN yHM6u0Nj7Z4BAfJUKaaD =qTWT -----END PGP SIGNATURE-----
--9hFanI9t9fEiloEc855Qrrv5QlLxBGhTK--
--===============0137024688415219189== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============0137024688415219189==--
|
|
|
|