drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Prüfung von Zertifikaten in pyopenssl
Name: |
Mangelnde Prüfung von Zertifikaten in pyopenssl |
|
ID: |
DSA-2763-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian sid, Debian squeeze, Debian wheezy |
|
Datum: |
Mi, 25. September 2013, 14:23 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4314 |
|
Applikationen: |
pyOpenSSL |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-2763-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso September 24, 2013 http://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : pyopenssl Vulnerability : hostname check bypassing Problem type : remote Debian-specific: no CVE ID : CVE-2013-4314 Debian Bug : 722055
It was discovered that PyOpenSSL, a Python wrapper around the OpenSSL library, does not properly handle certificates with NULL characters in the Subject Alternative Name field.
A remote attacker in the position to obtain a certificate for 'www.foo.org\0.example.com' from a CA that a SSL client trusts, could use this to spoof 'www.foo.org' and conduct man-in-the-middle attacks between the PyOpenSSL-using client and the SSL server.
For the oldstable distribution (squeeze), this problem has been fixed in version 0.10-1+squeeze1.
For the stable distribution (wheezy), this problem has been fixed in version 0.13-2+deb7u1.
For the unstable distribution (sid), this problem has been fixed in version 0.13-2.1.
We recommend that you upgrade your pyopenssl packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (GNU/Linux)
iQIcBAEBCgAGBQJSQcLoAAoJEHidbwV/2GP+BxUQAIVJbtpOvqPJlYxuBPdYSzRI 53N4nTbCZC9hTmDWCbmwH6yL1I2Iev7E6MHAuRZKJ2rRjrctF7r3cDNCPpCkLtNK 517MzzSPe7nmmhFHYNiDQIQeIb3bdKGiSGd5eTgvYzWtVFKqRQ8FHDkYYZjc5+y3 360CZAo3lRbkv5i2oKNPMvTQjXitQxAJjzTM4FKAsY5b1QHwsbtShaQHLza7QjUE AFWC5lW8aMFSK05IrBKs9vfEWsoiVkJjr/BjVEGR1KipI24eb4Yq3tOTlY6fWIyP vq6u5zSbg3N3hU1LFL3pg7ghH7dLovPCLxUycVfZjUy9tD8pRRj+rKbnqyok9ITk gKxhQORQXBw7f2cC9Yk7eFF4a0nNxUxYlfCNIEm+9Bvf3oRn37bfelJyiElGG/HM RpdjZRAsp81Sup+Rk0uEvDsLxb0Pl/4EfQNO7p2/pIXSqe5cDHy8NoIJPWEpJN9o hdKn3kaSuZPv4Z/KAMa2pyW8+bCkh4BwMZ/NloHkYZ9XodhFWFPGjd3vS+1PW3Mg +PKapJZNN563dosK+kqXrUaa2oU4fl4xxXPZPolETEuYxRV7+FKKwS2jlISTTpvF toFjeXUEUssjTcFOgYdg/tYODv1nLiOO1OyQkEhIGAJkvFWaVocgst1z9J8RxEMr YyEEGT5b+gT9Cvj1REjx =fCjj -----END PGP SIGNATURE-----
-- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org Archive: http://lists.debian.org/E1VOVsY-0002fs-8w@master.debian.org
|
|
|
|