what you don't know can hurt you

Mandriva Linux Security Advisory 2012-045

Mandriva Linux Security Advisory 2012-045
Posted Mar 30, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-045 - Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to cause a denial of service via a large SessionTicket. The updated packages have been patched to correct this issue.

tags | advisory, remote, denial of service, overflow
systems | linux, mandriva
advisories | CVE-2011-4128
MD5 | 572e8c5259414309e786c80cfcc0c353

Mandriva Linux Security Advisory 2012-045

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2012:045
http://www.mandriva.com/security/
_______________________________________________________________________

Package : gnutls
Date : March 30, 2012
Affected: 2010.1, 2011., Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A vulnerability has been found and corrected in GnuTLS:

Buffer overflow in the gnutls_session_get_data function in
lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before
3.0.7, when used on a client that performs nonstandard session
resumption, allows remote TLS servers to cause a denial of service
(application crash) via a large SessionTicket (CVE-2011-4128).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4128
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2010.1:
2bfd265514dab79f39f776dbd582df72 2010.1/i586/gnutls-2.8.6-1.2mdv2010.2.i586.rpm
62167460d1ac31b2e7d54bc0a5f98ab5 2010.1/i586/libgnutls26-2.8.6-1.2mdv2010.2.i586.rpm
043750d56eb108f763317746ce920a85 2010.1/i586/libgnutls-devel-2.8.6-1.2mdv2010.2.i586.rpm
13ee1e088f22ffabfe82b81e00f9e799 2010.1/SRPMS/gnutls-2.8.6-1.2mdv2010.2.src.rpm

Mandriva Linux 2010.1/X86_64:
6b57aa2034c33232fe12b1b2953e242c 2010.1/x86_64/gnutls-2.8.6-1.2mdv2010.2.x86_64.rpm
b2303b9b8dbff9a4755c561f601813f4 2010.1/x86_64/lib64gnutls26-2.8.6-1.2mdv2010.2.x86_64.rpm
af7670014b92577273944140cabe1b6f 2010.1/x86_64/lib64gnutls-devel-2.8.6-1.2mdv2010.2.x86_64.rpm
13ee1e088f22ffabfe82b81e00f9e799 2010.1/SRPMS/gnutls-2.8.6-1.2mdv2010.2.src.rpm

Mandriva Linux 2011:
6bb123df1f3176c25bb16105dc4fe7f3 2011/i586/gnutls-2.12.8-0.2-mdv2011.0.i586.rpm
23136ce1d38388653c690920c3baeb52 2011/i586/libgnutls26-2.12.8-0.2-mdv2011.0.i586.rpm
7561fb656d238acc33c6b61f20ddc8e9 2011/i586/libgnutls-devel-2.12.8-0.2-mdv2011.0.i586.rpm
5c0d0353c2ae4ec477b85d0194bf5872 2011/i586/libgnutls-ssl27-2.12.8-0.2-mdv2011.0.i586.rpm
41e127901e9fe3e84bf5ead8096c1665 2011/SRPMS/gnutls-2.12.8-0.2.src.rpm

Mandriva Linux 2011/X86_64:
bdd5be3403f8530f39f97ce90bad898e 2011/x86_64/gnutls-2.12.8-0.2-mdv2011.0.x86_64.rpm
51e3ada87157880774baab204af5a743 2011/x86_64/lib64gnutls26-2.12.8-0.2-mdv2011.0.x86_64.rpm
51b6cbff72d89135a680da20cf5df143 2011/x86_64/lib64gnutls-devel-2.12.8-0.2-mdv2011.0.x86_64.rpm
4f9a99872bdd82fe2a2b597ea32d70af 2011/x86_64/lib64gnutls-ssl27-2.12.8-0.2-mdv2011.0.x86_64.rpm
41e127901e9fe3e84bf5ead8096c1665 2011/SRPMS/gnutls-2.12.8-0.2.src.rpm

Mandriva Enterprise Server 5:
c662a0d8e022c7db282e577eac367ccd mes5/i586/gnutls-2.4.1-2.7mdvmes5.2.i586.rpm
ee9687cbb56d4a6520d3144ec6a317a3 mes5/i586/libgnutls26-2.4.1-2.7mdvmes5.2.i586.rpm
342295e2fe6f1ec99890d08ec280b004 mes5/i586/libgnutls-devel-2.4.1-2.7mdvmes5.2.i586.rpm
e00df4c4bf35636194532f0b4a900901 mes5/SRPMS/gnutls-2.4.1-2.7mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
29fa0ac0deb42e8e6c6b947487ef323f mes5/x86_64/gnutls-2.4.1-2.7mdvmes5.2.x86_64.rpm
21539a631a3cdb64e47537709524f5eb mes5/x86_64/lib64gnutls26-2.4.1-2.7mdvmes5.2.x86_64.rpm
1da550d6eb22b8014359eaa80be49ed1 mes5/x86_64/lib64gnutls-devel-2.4.1-2.7mdvmes5.2.x86_64.rpm
e00df4c4bf35636194532f0b4a900901 mes5/SRPMS/gnutls-2.4.1-2.7mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFPdbT3mqjQ0CJFipgRAmu6AJ9KTkzBqPT1sq5MDRmXrcmcj1pZrACfWAHC
JxJv5MUBpjjzq7IaZpWm/8E=
=EiVf
-----END PGP SIGNATURE-----

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

June 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    1 Files
  • 2
    Jun 2nd
    2 Files
  • 3
    Jun 3rd
    19 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    15 Files
  • 6
    Jun 6th
    12 Files
  • 7
    Jun 7th
    11 Files
  • 8
    Jun 8th
    1 Files
  • 9
    Jun 9th
    1 Files
  • 10
    Jun 10th
    15 Files
  • 11
    Jun 11th
    15 Files
  • 12
    Jun 12th
    15 Files
  • 13
    Jun 13th
    8 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close