[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1935 gnutls13 gnutls26 -- several vulnerabilities

ID: oval:org.mitre.oval:def:8289Date: (C)2009-12-15   (M)2024-02-19
Class: PATCHFamily: unix




Dan Kaminsky and Moxie Marlinspike discovered that gnutls, an implementation of the TLS/SSL protocol, does not properly handle a "\0" character in a domain name in the subject's Common Name or Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. (CVE-2009-2730) In addition, with this update, certificates with MD2 hash signatures are no longer accepted since they're no longer considered cryptograhically secure. It only affects the oldstable distribution (etch).(CVE-2009-2409)

Platform:
Debian 5.0
Debian 4.0
Product:
gnutls13
gnutls26
Reference:
DSA-1935
CVE-2009-2409
CVE-2009-2730
CVE    2
CVE-2009-2730
CVE-2009-2409
CPE    2
cpe:/o:debian:debian_linux:4.x
cpe:/o:debian:debian_linux:5.x

© SecPod Technologies