[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2009:221 -- Mandriva libneon0.27

ID: oval:org.secpod.oval:def:300448Date: (C)2012-01-07   (M)2024-02-19
Class: PATCHFamily: unix




Multiple vulnerabilities has been found and corrected in libneon0.27: neon before 0.28.6, when expat is used, does not properly detect recursion during entity expansion, which allows context-dependent attackers to cause a denial of service via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564 . neon before 0.28.6, when OpenSSL is used, does not properly handle a "\0" character in a domain name in the subject"s Common Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408 . This update provides a solution to these vulnerabilities.

Platform:
Mandriva Linux 2009.0
Mandriva Linux 2009.1
Mandriva Linux 2008.1
Product:
libneon0.27
Reference:
MDVSA-2009:221
CVE-2009-2474
CVE-2009-2473
CVE    2
CVE-2009-2473
CVE-2009-2474
CPE    3
cpe:/o:mandriva:linux:2008.1
cpe:/o:mandriva:linux:2009.0
cpe:/o:mandriva:linux:2009.1

© SecPod Technologies