Mangelnde Prüfung von Zertifikaten in serf
ID: | USN-2315-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 12.04 LTS, Ubuntu 14.04 LTS |
Datum: | Fr, 15. August 2014, 07:57 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3504 |
Applikationen: | serf |
Originalnachricht |
|
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============7988603909793015450== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="lavIOeVPeafXMHM01wn57PP4rqanK29u9" This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --lavIOeVPeafXMHM01wn57PP4rqanK29u9 Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-2315-1 August 14, 2014 serf vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: Fraudulent security certificates could allow sensitive information to be exposed when accessing the Internet. Software Description: - serf: high-performance asynchronous HTTP client library Details: Ben Reser discovered that serf did not correctly handle SSL certificates with NUL bytes in the CommonName or SubjectAltNames fields. A remote attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: libserf-1-1 1.3.3-1ubuntu0.1 Ubuntu 12.04 LTS: libserf1 1.0.0-2ubuntu0.1 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2315-1 CVE-2014-3504 Package Information: https://launchpad.net/ubuntu/+source/serf/1.3.3-1ubuntu0.1 https://launchpad.net/ubuntu/+source/serf/1.0.0-2ubuntu0.1 --lavIOeVPeafXMHM01wn57PP4rqanK29u9 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJT7PxDAAoJEGVp2FWnRL6TLV0QAK0ppFUDYrboSRnN5TNm3vpG D0DCQLQXUJ3VxywbuC0CUKgQA/8bmJl0NXxgZqpevHBu1OcJBLQpnC9J9gV2VnRs 8fieawoXJb33joroKXZFNgTcOtbAHrma0xXM3aFXiJuzB13bWY4JgMBKhuKvuZsL UbHIiNSI67Zdkx7whVVLHoxey2cZo0pN9VH67NuswAWGYBBFbrri1RQfWopv27FK 0b4Hx3NppsnSerboCVfxpWKupO6vciHTqomilKqPWmd3SmZc2ais9fVQQ21U3VuH kzi13q27WVjhScB9ROUCGHz5Zx9mUwPimo227wPMe5Yx/IWkiqOUTZSeCN9+AkTd 6A/Dz1XZGfQbwE/DUqMaqtO7Rrg6ol2MppP0O007+HvgbdJHEr0FCO8oS+s746wm 3aEZvN0X5K2luwAsAZJne+iDeD+lddrez8T05ZdKrmEL4ab/p0rxkidCjVcj1cia w0e75y1qrZ0yGZ+Dk0dKRHvb0Wsl7FkWp0wVqmVzyJP/I80zGhBAtVluMtpsujcE 2bO8jLfy6epG2Ly3bcxidk6G5xPri3LjBs6qs36Gg0ixbkcBNqWId1XEMVmXppIx ZB0x9nER6IU+0AScH4/ecjuXH15mzQ9a/NVnGhqR3nA2R/f1PbdQMfO8X2Qy8+ft 5xUlYdy03xYqLYDKQ4c3 =b07h -----END PGP SIGNATURE----- --lavIOeVPeafXMHM01wn57PP4rqanK29u9-- --===============7988603909793015450== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce --===============7988603909793015450==-- |