Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2009-1232

Опубликовано: 26 авг. 2009
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2009-1232: gnutls security update (MODERATE)

[1.4.1-3.5]

  • fix NUL characters in DN and SAN cert fields issue, make sure gnutls_x509_crt_check_hostname() fails when certificate has no CN or SAN CVE-2009-2730 (#516231)

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

gnutls

1.4.1-3.el5_3.5

gnutls-devel

1.4.1-3.el5_3.5

gnutls-utils

1.4.1-3.el5_3.5

Oracle Linux x86_64

gnutls

1.4.1-3.el5_3.5

gnutls-devel

1.4.1-3.el5_3.5

gnutls-utils

1.4.1-3.el5_3.5

Oracle Linux i386

gnutls

1.4.1-3.el5_3.5

gnutls-devel

1.4.1-3.el5_3.5

gnutls-utils

1.4.1-3.el5_3.5

Связанные CVE

Связанные уязвимости

ubuntu
почти 16 лет назад

libgnutls in GnuTLS before 2.8.2 does not properly handle a '\0' character in a domain name in the subject's (1) Common Name (CN) or (2) Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

redhat
почти 16 лет назад

libgnutls in GnuTLS before 2.8.2 does not properly handle a '\0' character in a domain name in the subject's (1) Common Name (CN) or (2) Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

nvd
почти 16 лет назад

libgnutls in GnuTLS before 2.8.2 does not properly handle a '\0' character in a domain name in the subject's (1) Common Name (CN) or (2) Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

debian
почти 16 лет назад

libgnutls in GnuTLS before 2.8.2 does not properly handle a '\0' chara ...

github
около 3 лет назад

libgnutls in GnuTLS before 2.8.2 does not properly handle a '\0' character in a domain name in the subject's (1) Common Name (CN) or (2) Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.