exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2009-203

Mandriva Linux Security Advisory 2009-203
Posted Aug 15, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-203 - lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. This update provides a solution to this vulnerability.

tags | advisory, arbitrary, spoof
systems | linux, mandriva
advisories | CVE-2009-2417
SHA-256 | 64a046ec10964c7bc97cd39c1a82bb0dfd856c661b18bd5a0fa74d1986865cf5

Mandriva Linux Security Advisory 2009-203

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2009:203
http://www.mandriva.com/security/
_______________________________________________________________________

Package : curl
Date : August 15, 2009
Affected: 2008.1, 2009.0, Corporate 3.0, Corporate 4.0,
Enterprise Server 5.0, Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

A vulnerability has been found and corrected in curl:

lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is
used, does not properly handle a '\0' character in a domain name in
the subject's Common Name (CN) field of an X.509 certificate, which
allows man-in-the-middle attackers to spoof arbitrary SSL servers via
a crafted certificate issued by a legitimate Certification Authority,
a related issue to CVE-2009-2408 (CVE-2009-2417).

This update provides a solution to this vulnerability.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.1:
8e2ea8611aefeb2a40d77afd88277fb4 2008.1/i586/curl-7.18.0-1.2mdv2008.1.i586.rpm
c70570c0bb2c329c19bd9317f732623d 2008.1/i586/curl-examples-7.18.0-1.2mdv2008.1.i586.rpm
c2a33e1c57b106a4030abfc8e2d3cc92 2008.1/i586/libcurl4-7.18.0-1.2mdv2008.1.i586.rpm
85220b736085c4ed0d45a5352d70b81e 2008.1/i586/libcurl-devel-7.18.0-1.2mdv2008.1.i586.rpm
387a18822140e74b895cf64b735a95f1 2008.1/SRPMS/curl-7.18.0-1.2mdv2008.1.src.rpm

Mandriva Linux 2008.1/X86_64:
8bdfa65ac800bb2444b7bad1319a9ed2 2008.1/x86_64/curl-7.18.0-1.2mdv2008.1.x86_64.rpm
1db03c79d7f77ae66d96100af128a498 2008.1/x86_64/curl-examples-7.18.0-1.2mdv2008.1.x86_64.rpm
d3dc17d25cf42e331775cf3ad9f8011a 2008.1/x86_64/lib64curl4-7.18.0-1.2mdv2008.1.x86_64.rpm
40fe1718975e298ed247ed8184092616 2008.1/x86_64/lib64curl-devel-7.18.0-1.2mdv2008.1.x86_64.rpm
387a18822140e74b895cf64b735a95f1 2008.1/SRPMS/curl-7.18.0-1.2mdv2008.1.src.rpm

Mandriva Linux 2009.0:
892828128b099818d440a8407c229f6a 2009.0/i586/curl-7.19.0-2.3mdv2009.0.i586.rpm
d2401c2950c47eb04052c9cd79fbc179 2009.0/i586/curl-examples-7.19.0-2.3mdv2009.0.i586.rpm
421938c204416ad6a226f89cd67ebabb 2009.0/i586/libcurl4-7.19.0-2.3mdv2009.0.i586.rpm
7cb71ef8b449125765efed99af777eda 2009.0/i586/libcurl-devel-7.19.0-2.3mdv2009.0.i586.rpm
df4a805594f16bfce93b18a6e0777450 2009.0/SRPMS/curl-7.19.0-2.3mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
349b02bbda7eb662997f3183ef6d87c0 2009.0/x86_64/curl-7.19.0-2.3mdv2009.0.x86_64.rpm
9a09d4cb2c0ce21a78363ad7a07dd011 2009.0/x86_64/curl-examples-7.19.0-2.3mdv2009.0.x86_64.rpm
5e9eb5492801e1f31bba4343b25d8d6b 2009.0/x86_64/lib64curl4-7.19.0-2.3mdv2009.0.x86_64.rpm
438a1fb2bc30d993c533ca0ced47581d 2009.0/x86_64/lib64curl-devel-7.19.0-2.3mdv2009.0.x86_64.rpm
df4a805594f16bfce93b18a6e0777450 2009.0/SRPMS/curl-7.19.0-2.3mdv2009.0.src.rpm

Corporate 3.0:
1cb682e71b060c3e806651091692f319 corporate/3.0/i586/curl-7.11.0-2.4.C30mdk.i586.rpm
6e86a78de017172c73455f3bcc7be1fd corporate/3.0/i586/libcurl2-7.11.0-2.4.C30mdk.i586.rpm
49c2a0efd318ee51ac66ab4dacd58d44 corporate/3.0/i586/libcurl2-devel-7.11.0-2.4.C30mdk.i586.rpm
aeef3de8e19539e1e5cef22a3499cad7 corporate/3.0/SRPMS/curl-7.11.0-2.4.C30mdk.src.rpm

Corporate 3.0/X86_64:
c36bd07602a95362d5f8096076af96ff corporate/3.0/x86_64/curl-7.11.0-2.4.C30mdk.x86_64.rpm
94d4e28bf08697f658c9532bc8ef67ed corporate/3.0/x86_64/lib64curl2-7.11.0-2.4.C30mdk.x86_64.rpm
7ef2d495db13d134014f013379d43093 corporate/3.0/x86_64/lib64curl2-devel-7.11.0-2.4.C30mdk.x86_64.rpm
aeef3de8e19539e1e5cef22a3499cad7 corporate/3.0/SRPMS/curl-7.11.0-2.4.C30mdk.src.rpm

Corporate 4.0:
37ca03172a8b502f16a582d139ee3077 corporate/4.0/i586/curl-7.14.0-2.4.20060mlcs4.i586.rpm
4a7453f3ad0959dc987fb7988920fb29 corporate/4.0/i586/libcurl3-7.14.0-2.4.20060mlcs4.i586.rpm
34f9357fdc46b5814d15a0d67ac5c97a corporate/4.0/i586/libcurl3-devel-7.14.0-2.4.20060mlcs4.i586.rpm
76b72bc8938fdfc1bd425483a15a75f9 corporate/4.0/SRPMS/curl-7.14.0-2.4.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
688129530500a0cbfd405992da4b9377 corporate/4.0/x86_64/curl-7.14.0-2.4.20060mlcs4.x86_64.rpm
ca17056e48cb81012c5bd7a7d35b8d49 corporate/4.0/x86_64/lib64curl3-7.14.0-2.4.20060mlcs4.x86_64.rpm
51d0e70dd8230538eb484e15b70320b7 corporate/4.0/x86_64/lib64curl3-devel-7.14.0-2.4.20060mlcs4.x86_64.rpm
76b72bc8938fdfc1bd425483a15a75f9 corporate/4.0/SRPMS/curl-7.14.0-2.4.20060mlcs4.src.rpm

Mandriva Enterprise Server 5:
a374ff5beddecedf918904a67b208c00 mes5/i586/curl-7.19.0-2.3mdvmes5.i586.rpm
262a4e29d7c8ef7f451c87b7bc8e2c66 mes5/i586/curl-examples-7.19.0-2.3mdvmes5.i586.rpm
e86cc1febe979624999393b80c846715 mes5/i586/libcurl4-7.19.0-2.3mdvmes5.i586.rpm
ba7da37dd0c8c5e4ea8b94a123ba351c mes5/i586/libcurl-devel-7.19.0-2.3mdvmes5.i586.rpm
92e3583395a1ef3e8cd947e4ddded60d mes5/SRPMS/curl-7.19.0-2.3mdvmes5.src.rpm

Mandriva Enterprise Server 5/X86_64:
4e66472f996cda47aaad865b7e9a2a9a mes5/x86_64/curl-7.19.0-2.3mdvmes5.x86_64.rpm
cb61278d082c2d15bdd209189f4eaaea mes5/x86_64/curl-examples-7.19.0-2.3mdvmes5.x86_64.rpm
231221eeb4a18060b32d0f5dcac2179e mes5/x86_64/lib64curl4-7.19.0-2.3mdvmes5.x86_64.rpm
5b2fa79ff88f193caaffce7a2fc0b127 mes5/x86_64/lib64curl-devel-7.19.0-2.3mdvmes5.x86_64.rpm
92e3583395a1ef3e8cd947e4ddded60d mes5/SRPMS/curl-7.19.0-2.3mdvmes5.src.rpm

Multi Network Firewall 2.0:
d9faa6984ea90caba24d8dd4924bde9c mnf/2.0/i586/curl-7.11.0-2.4.C30mdk.i586.rpm
93742023ff49d812df74fe370370b0c5 mnf/2.0/i586/libcurl2-7.11.0-2.4.C30mdk.i586.rpm
17709107a56bbee9b5bbee8e19354dc9 mnf/2.0/i586/libcurl2-devel-7.11.0-2.4.C30mdk.i586.rpm
9765888e1bffb0ebd83d1ec71574de2b mnf/2.0/SRPMS/curl-7.11.0-2.4.C30mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKhq5AmqjQ0CJFipgRAkEjAKC6q4dguKEvsveWuP/zFZO2cki0MgCfSOef
0Y5QKEEUwQ/yEEgINNXRvIA=
=43oN
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close