[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1KTUAv-0001PS-Bq@titan.mandriva.com>
Date: Wed, 13 Aug 2008 22:11:01 -0600
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2008:168 ] stunnel
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2008:168
http://www.mandriva.com/security/
_______________________________________________________________________
Package : stunnel
Date : August 13, 2008
Affected: 2007.1, 2008.0, 2008.1
_______________________________________________________________________
Problem Description:
A vulnerability was found in the OCSP search functionality in stunnel
that could allow a remote attacker to use a revoked certificate that
would be successfully authenticated by stunnel (CVE-2008-2420).
This flaw only concerns users who have enabled OCSP validation
in stunnel.
The updated packages have been patched to correct this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2420
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.1:
8d76312a1f68dae3c5547d1efe1f04cc 2007.1/i586/libstunnel0-4.20-1.1mdv2007.1.i586.rpm
da8a96417052081eb33b507f308a6c4b 2007.1/i586/libstunnel0-devel-4.20-1.1mdv2007.1.i586.rpm
b5c31bfed05245b1c0d4597ded096312 2007.1/i586/stunnel-4.20-1.1mdv2007.1.i586.rpm
748e1bb078bd1ac4e1e6c00b6487c1d1 2007.1/SRPMS/stunnel-4.20-1.1mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64:
eb6d688c10d208e525463866bfe329b4 2007.1/x86_64/lib64stunnel0-4.20-1.1mdv2007.1.x86_64.rpm
ef94ec15ddb3eba1d2c8b17e17dd52e9 2007.1/x86_64/lib64stunnel0-devel-4.20-1.1mdv2007.1.x86_64.rpm
4b16e5420f5d54420a2399c6d03a93dd 2007.1/x86_64/stunnel-4.20-1.1mdv2007.1.x86_64.rpm
748e1bb078bd1ac4e1e6c00b6487c1d1 2007.1/SRPMS/stunnel-4.20-1.1mdv2007.1.src.rpm
Mandriva Linux 2008.0:
7a790c1d719af5dc1643e5df86f8f8a7 2008.0/i586/libstunnel0-4.20-1.1mdv2008.0.i586.rpm
4f1c7188d0c0b37619806db9bd2c817a 2008.0/i586/libstunnel0-devel-4.20-1.1mdv2008.0.i586.rpm
af62cf5ddc6a2245b71e3f184837cfab 2008.0/i586/stunnel-4.20-1.1mdv2008.0.i586.rpm
4b30c083467a6c39ccadfbf11aca0349 2008.0/SRPMS/stunnel-4.20-1.1mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64:
77ff841a053da0420a6bd673106c5505 2008.0/x86_64/lib64stunnel0-4.20-1.1mdv2008.0.x86_64.rpm
3ec61049acebcadf3f3a758316aa161c 2008.0/x86_64/lib64stunnel0-devel-4.20-1.1mdv2008.0.x86_64.rpm
0e796c52f469cf1b3514336de2da4f9a 2008.0/x86_64/stunnel-4.20-1.1mdv2008.0.x86_64.rpm
4b30c083467a6c39ccadfbf11aca0349 2008.0/SRPMS/stunnel-4.20-1.1mdv2008.0.src.rpm
Mandriva Linux 2008.1:
6e339adfe0c54fa629fe274c1647e390 2008.1/i586/libstunnel0-4.21-2.1mdv2008.1.i586.rpm
f9a621e2ffd56803df35989fcd503781 2008.1/i586/libstunnel-devel-4.21-2.1mdv2008.1.i586.rpm
14fd3a1dbc4dfda671ce5d7b12d471cf 2008.1/i586/libstunnel-static-devel-4.21-2.1mdv2008.1.i586.rpm
1fc86b79e57285aa4ebcc6c08f67c656 2008.1/i586/stunnel-4.21-2.1mdv2008.1.i586.rpm
9633ff426cab24ddb64434c2fc4c1416 2008.1/SRPMS/stunnel-4.21-2.1mdv2008.1.src.rpm
Mandriva Linux 2008.1/X86_64:
d1c79ff16707a8d6e0303562207821f3 2008.1/x86_64/lib64stunnel0-4.21-2.1mdv2008.1.x86_64.rpm
b9f07f12bff285f437e49fe82a105778 2008.1/x86_64/lib64stunnel-devel-4.21-2.1mdv2008.1.x86_64.rpm
b4548ec863f78cb0e82059579860e59d 2008.1/x86_64/lib64stunnel-static-devel-4.21-2.1mdv2008.1.x86_64.rpm
dc3877966ffddfdb363cf4a0edcca71f 2008.1/x86_64/stunnel-4.21-2.1mdv2008.1.x86_64.rpm
9633ff426cab24ddb64434c2fc4c1416 2008.1/SRPMS/stunnel-4.21-2.1mdv2008.1.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFIo4ZYmqjQ0CJFipgRAlJcAJ9SxbqPWr7rFfXOQrvunstzD6CaDQCcDFVV
gu0oRt+IXZm2jrzLl95gwaQ=
=rbeI
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists