drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Prüfung von Zertifikaten in NSS
Name: |
Mangelnde Prüfung von Zertifikaten in NSS |
|
ID: |
USN-2159-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 10.04 LTS, Ubuntu 12.04 LTS, Ubuntu 12.10, Ubuntu 13.10 |
|
Datum: |
Do, 3. April 2014, 09:11 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492 |
|
Applikationen: |
NSS |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============3083620460261447618== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="NLUxaM5CKJGawhNw8mHdDJitb6NPps54X"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --NLUxaM5CKJGawhNw8mHdDJitb6NPps54X Content-Type: text/plain; charset=UTF- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-2159-1 April 02, 2014
nss vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.10 - Ubuntu 12.10 - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS
Summary:
NSS could be made to expose sensitive information over the network.
Software Description: - nss: Network Security Service library
Details:
It was discovered that NSS incorrectly handled wildcard certificates when used with internationalized domain names. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could be exploited to spoof SSL servers.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 13.10: libnss3 2:3.15.4-0ubuntu0.13.10.2
Ubuntu 12.10: libnss3 3.15.4-0ubuntu0.12.10.2
Ubuntu 12.04 LTS: libnss3 3.15.4-0ubuntu0.12.04.2
Ubuntu 10.04 LTS: libnss3-1d 3.15.4-0ubuntu0.10.04.2
After a standard system update you need to restart any applications that use NSS, such as Evolution and Chromium, to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2159-1 CVE-2014-1492
Package Information: https://launchpad.net/ubuntu/+source/nss/2:3.15.4-0ubuntu0.13.10.2 https://launchpad.net/ubuntu/+source/nss/3.15.4-0ubuntu0.12.10.2 https://launchpad.net/ubuntu/+source/nss/3.15.4-0ubuntu0.12.04.2 https://launchpad.net/ubuntu/+source/nss/3.15.4-0ubuntu0.10.04.2
--NLUxaM5CKJGawhNw8mHdDJitb6NPps54X Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1 Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
iQIcBAEBCgAGBQJTPFAmAAoJEGVp2FWnRL6TD+MQALms4T7uQAWDvbykfLNyL94+ A8XzZrDFimRKTUpWyIwuXQekWsaAxu9ceV3zSbCW7/epbEE6tvibrP7RpiLUC7ER /pNLRX8fOLJKKaQ78LUNzQoNSG2HmLoNOMLx3PChrqTWLf141yDCymgNYgOCLhvn IMd2TBjnjg9cqbtQbcBMOOP+VnLQ/HhsMXcZtsg+vdngTDmxUJg4Jcz1FVODCNhi 33tEUNPLQ5HxSlm4g0vrKZknbgLh47t5loS+NCTG6MWXpYYiF9ErCyzFiiMiuKUl NYVs8uZyzlkJCi8vZTV1qZhSSYM2u445ZTcqXd9hV3QxOAeBBo7BBE6TuIGF4oAH vL2q/h2x7qg2rASvLN2yXYtSMAvm3kmVJpKOlTNKEolqUwTnsxE6QxHs8DYraGy2 wNlnWxes/DHDTA7XiRW9NbvfjSY+qwh8hX1auYxqdwZk9SSS6G1cqkZOzRQmRt1I SID5EwTSrox3AxpaMRw7pbxRA6rMrxUuJ512uu+nwLQTg0bycfTTXHoNzIWQ3H02 2JIp9TH3qzqaZfLG0igWSlrprhdRxlZUKHXNC3U3Mvld5V4UUJWqxvqTT6LA1FxX 06bjPwo/rut6psl08gfstqh0ZVVXPyMWSjTkNRm5brJXp5ficgRmCBt2mW5ISdBA UhtxttOq5JnCW8z/x0FI =xfrj -----END PGP SIGNATURE-----
--NLUxaM5CKJGawhNw8mHdDJitb6NPps54X--
--===============3083620460261447618== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============3083620460261447618==--
|
|
|
|