lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1McLif-0003lE-6c@titan.mandriva.com>
Date: Sat, 15 Aug 2009 18:03:00 +0200
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2009:203 ] curl


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2009:203
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : curl
 Date    : August 15, 2009
 Affected: 2008.1, 2009.0, Corporate 3.0, Corporate 4.0,
           Enterprise Server 5.0, Multi Network Firewall 2.0
 _______________________________________________________________________

 Problem Description:

 A vulnerability has been found and corrected in curl:
 
 lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is
 used, does not properly handle a '\0' character in a domain name in
 the subject's Common Name (CN) field of an X.509 certificate, which
 allows man-in-the-middle attackers to spoof arbitrary SSL servers via
 a crafted certificate issued by a legitimate Certification Authority,
 a related issue to CVE-2009-2408 (CVE-2009-2417).
 
 This update provides a solution to this vulnerability.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2008.1:
 8e2ea8611aefeb2a40d77afd88277fb4  2008.1/i586/curl-7.18.0-1.2mdv2008.1.i586.rpm
 c70570c0bb2c329c19bd9317f732623d  2008.1/i586/curl-examples-7.18.0-1.2mdv2008.1.i586.rpm
 c2a33e1c57b106a4030abfc8e2d3cc92  2008.1/i586/libcurl4-7.18.0-1.2mdv2008.1.i586.rpm
 85220b736085c4ed0d45a5352d70b81e  2008.1/i586/libcurl-devel-7.18.0-1.2mdv2008.1.i586.rpm 
 387a18822140e74b895cf64b735a95f1  2008.1/SRPMS/curl-7.18.0-1.2mdv2008.1.src.rpm

 Mandriva Linux 2008.1/X86_64:
 8bdfa65ac800bb2444b7bad1319a9ed2  2008.1/x86_64/curl-7.18.0-1.2mdv2008.1.x86_64.rpm
 1db03c79d7f77ae66d96100af128a498  2008.1/x86_64/curl-examples-7.18.0-1.2mdv2008.1.x86_64.rpm
 d3dc17d25cf42e331775cf3ad9f8011a  2008.1/x86_64/lib64curl4-7.18.0-1.2mdv2008.1.x86_64.rpm
 40fe1718975e298ed247ed8184092616  2008.1/x86_64/lib64curl-devel-7.18.0-1.2mdv2008.1.x86_64.rpm 
 387a18822140e74b895cf64b735a95f1  2008.1/SRPMS/curl-7.18.0-1.2mdv2008.1.src.rpm

 Mandriva Linux 2009.0:
 892828128b099818d440a8407c229f6a  2009.0/i586/curl-7.19.0-2.3mdv2009.0.i586.rpm
 d2401c2950c47eb04052c9cd79fbc179  2009.0/i586/curl-examples-7.19.0-2.3mdv2009.0.i586.rpm
 421938c204416ad6a226f89cd67ebabb  2009.0/i586/libcurl4-7.19.0-2.3mdv2009.0.i586.rpm
 7cb71ef8b449125765efed99af777eda  2009.0/i586/libcurl-devel-7.19.0-2.3mdv2009.0.i586.rpm 
 df4a805594f16bfce93b18a6e0777450  2009.0/SRPMS/curl-7.19.0-2.3mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 349b02bbda7eb662997f3183ef6d87c0  2009.0/x86_64/curl-7.19.0-2.3mdv2009.0.x86_64.rpm
 9a09d4cb2c0ce21a78363ad7a07dd011  2009.0/x86_64/curl-examples-7.19.0-2.3mdv2009.0.x86_64.rpm
 5e9eb5492801e1f31bba4343b25d8d6b  2009.0/x86_64/lib64curl4-7.19.0-2.3mdv2009.0.x86_64.rpm
 438a1fb2bc30d993c533ca0ced47581d  2009.0/x86_64/lib64curl-devel-7.19.0-2.3mdv2009.0.x86_64.rpm 
 df4a805594f16bfce93b18a6e0777450  2009.0/SRPMS/curl-7.19.0-2.3mdv2009.0.src.rpm

 Corporate 3.0:
 1cb682e71b060c3e806651091692f319  corporate/3.0/i586/curl-7.11.0-2.4.C30mdk.i586.rpm
 6e86a78de017172c73455f3bcc7be1fd  corporate/3.0/i586/libcurl2-7.11.0-2.4.C30mdk.i586.rpm
 49c2a0efd318ee51ac66ab4dacd58d44  corporate/3.0/i586/libcurl2-devel-7.11.0-2.4.C30mdk.i586.rpm 
 aeef3de8e19539e1e5cef22a3499cad7  corporate/3.0/SRPMS/curl-7.11.0-2.4.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 c36bd07602a95362d5f8096076af96ff  corporate/3.0/x86_64/curl-7.11.0-2.4.C30mdk.x86_64.rpm
 94d4e28bf08697f658c9532bc8ef67ed  corporate/3.0/x86_64/lib64curl2-7.11.0-2.4.C30mdk.x86_64.rpm
 7ef2d495db13d134014f013379d43093  corporate/3.0/x86_64/lib64curl2-devel-7.11.0-2.4.C30mdk.x86_64.rpm 
 aeef3de8e19539e1e5cef22a3499cad7  corporate/3.0/SRPMS/curl-7.11.0-2.4.C30mdk.src.rpm

 Corporate 4.0:
 37ca03172a8b502f16a582d139ee3077  corporate/4.0/i586/curl-7.14.0-2.4.20060mlcs4.i586.rpm
 4a7453f3ad0959dc987fb7988920fb29  corporate/4.0/i586/libcurl3-7.14.0-2.4.20060mlcs4.i586.rpm
 34f9357fdc46b5814d15a0d67ac5c97a  corporate/4.0/i586/libcurl3-devel-7.14.0-2.4.20060mlcs4.i586.rpm 
 76b72bc8938fdfc1bd425483a15a75f9  corporate/4.0/SRPMS/curl-7.14.0-2.4.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 688129530500a0cbfd405992da4b9377  corporate/4.0/x86_64/curl-7.14.0-2.4.20060mlcs4.x86_64.rpm
 ca17056e48cb81012c5bd7a7d35b8d49  corporate/4.0/x86_64/lib64curl3-7.14.0-2.4.20060mlcs4.x86_64.rpm
 51d0e70dd8230538eb484e15b70320b7  corporate/4.0/x86_64/lib64curl3-devel-7.14.0-2.4.20060mlcs4.x86_64.rpm 
 76b72bc8938fdfc1bd425483a15a75f9  corporate/4.0/SRPMS/curl-7.14.0-2.4.20060mlcs4.src.rpm

 Mandriva Enterprise Server 5:
 a374ff5beddecedf918904a67b208c00  mes5/i586/curl-7.19.0-2.3mdvmes5.i586.rpm
 262a4e29d7c8ef7f451c87b7bc8e2c66  mes5/i586/curl-examples-7.19.0-2.3mdvmes5.i586.rpm
 e86cc1febe979624999393b80c846715  mes5/i586/libcurl4-7.19.0-2.3mdvmes5.i586.rpm
 ba7da37dd0c8c5e4ea8b94a123ba351c  mes5/i586/libcurl-devel-7.19.0-2.3mdvmes5.i586.rpm 
 92e3583395a1ef3e8cd947e4ddded60d  mes5/SRPMS/curl-7.19.0-2.3mdvmes5.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 4e66472f996cda47aaad865b7e9a2a9a  mes5/x86_64/curl-7.19.0-2.3mdvmes5.x86_64.rpm
 cb61278d082c2d15bdd209189f4eaaea  mes5/x86_64/curl-examples-7.19.0-2.3mdvmes5.x86_64.rpm
 231221eeb4a18060b32d0f5dcac2179e  mes5/x86_64/lib64curl4-7.19.0-2.3mdvmes5.x86_64.rpm
 5b2fa79ff88f193caaffce7a2fc0b127  mes5/x86_64/lib64curl-devel-7.19.0-2.3mdvmes5.x86_64.rpm 
 92e3583395a1ef3e8cd947e4ddded60d  mes5/SRPMS/curl-7.19.0-2.3mdvmes5.src.rpm

 Multi Network Firewall 2.0:
 d9faa6984ea90caba24d8dd4924bde9c  mnf/2.0/i586/curl-7.11.0-2.4.C30mdk.i586.rpm
 93742023ff49d812df74fe370370b0c5  mnf/2.0/i586/libcurl2-7.11.0-2.4.C30mdk.i586.rpm
 17709107a56bbee9b5bbee8e19354dc9  mnf/2.0/i586/libcurl2-devel-7.11.0-2.4.C30mdk.i586.rpm 
 9765888e1bffb0ebd83d1ec71574de2b  mnf/2.0/SRPMS/curl-7.11.0-2.4.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKhq5AmqjQ0CJFipgRAkEjAKC6q4dguKEvsveWuP/zFZO2cki0MgCfSOef
0Y5QKEEUwQ/yEEgINNXRvIA=
=43oN
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ