Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2009-1209

Опубликовано: 13 авг. 2009
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2009-1209: curl security update (MODERATE)

[7.15.5-2.1.el5_3.5]

  • fix CVE-2009-2417 (#516257)

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

curl

7.15.5-2.1.el5_3.5

curl-devel

7.15.5-2.1.el5_3.5

Oracle Linux x86_64

curl

7.15.5-2.1.el5_3.5

curl-devel

7.15.5-2.1.el5_3.5

Oracle Linux i386

curl

7.15.5-2.1.el5_3.5

curl-devel

7.15.5-2.1.el5_3.5

Связанные CVE

Связанные уязвимости

ubuntu
почти 16 лет назад

lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

redhat
почти 16 лет назад

lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

nvd
почти 16 лет назад

lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

debian
почти 16 лет назад

lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is u ...

github
около 3 лет назад

lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.