Login
Newsletter
Werbung

Sicherheit: Mangelnde Prüfung von Zertifikaten in NSS
Aktuelle Meldungen Distributionen
Name: Mangelnde Prüfung von Zertifikaten in NSS
ID: USN-2159-1
Distribution: Ubuntu
Plattformen: Ubuntu 10.04 LTS, Ubuntu 12.04 LTS, Ubuntu 12.10, Ubuntu 13.10
Datum: Do, 3. April 2014, 09:11
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
Applikationen: NSS

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============3083620460261447618==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="NLUxaM5CKJGawhNw8mHdDJitb6NPps54X"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--NLUxaM5CKJGawhNw8mHdDJitb6NPps54X
Content-Type: text/plain; charset=UTF-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-2159-1
April 02, 2014

nss vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 13.10
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS

Summary:

NSS could be made to expose sensitive information over the network.

Software Description:
- nss: Network Security Service library

Details:

It was discovered that NSS incorrectly handled wildcard certificates when
used with internationalized domain names. If a remote attacker were able to
perform a man-in-the-middle attack, this flaw could be exploited to spoof
SSL servers.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 13.10:
libnss3 2:3.15.4-0ubuntu0.13.10.2

Ubuntu 12.10:
libnss3 3.15.4-0ubuntu0.12.10.2

Ubuntu 12.04 LTS:
libnss3 3.15.4-0ubuntu0.12.04.2

Ubuntu 10.04 LTS:
libnss3-1d 3.15.4-0ubuntu0.10.04.2

After a standard system update you need to restart any applications that
use NSS, such as Evolution and Chromium, to make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2159-1
CVE-2014-1492

Package Information:
https://launchpad.net/ubuntu/+source/nss/2:3.15.4-0ubuntu0.13.10.2
https://launchpad.net/ubuntu/+source/nss/3.15.4-0ubuntu0.12.10.2
https://launchpad.net/ubuntu/+source/nss/3.15.4-0ubuntu0.12.04.2
https://launchpad.net/ubuntu/+source/nss/3.15.4-0ubuntu0.10.04.2



--NLUxaM5CKJGawhNw8mHdDJitb6NPps54X
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=xfrj
-----END PGP SIGNATURE-----

--NLUxaM5CKJGawhNw8mHdDJitb6NPps54X--


--===============3083620460261447618==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============3083620460261447618==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung