Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.56300
Kategorie:Ubuntu Local Security Checks
Titel:Ubuntu USN-251-1 (libtasn1-2)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing an update to libtasn1-2
announced via advisory USN-251-1.

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected: libtasn1-2 libgnutls10 libgnutls11

Evgeny Legerov discovered a buffer overflow in the DER format decoding
function of the libtasn library. This library is mainly used by the
GNU TLS library
by sending a specially crafted X.509 certificate to a
server which uses TLS encryption/authentication, a remote attacker
could exploit this to crash that server process and possibly even
execute arbitrary code with the privileges of that server.

In order to fix the vulnerability in libtasn, several internal
function signatures had to be changed
some of these functions are
used by the GNU TLS library, so that library needs to be updated as
well.

Solution:
The problem can be corrected by upgrading the affected package to
the following versions:

Ubuntu 4.10:
libtasn1-2: 0.2.7-2ubuntu0.1
libgnutls10: 1.0.4-3ubuntu1.2

Ubuntu 5.04:
libtasn1-2: 0.2.10-4ubuntu0.0.5.04.1
libgnutls11: 1.0.16-13ubuntu0.2

Ubuntu 5.10:
libtasn1-2: 0.2.10-4ubuntu0.1
libgnutls11: 1.0.16-13.1ubuntu1.1

It is highly recommended to restart your computer after a standard
system upgrade to effect the necessary changes. If you cannot afford
to do that then you need to restart all server processes which use
TLS or SSL.

http://www.securityspace.com/smysecure/catid.html?in=USN-251-1

Risk factor : High

CVSS Score:
7.5

Querverweis: BugTraq ID: 16568
Common Vulnerability Exposure (CVE) ID: CVE-2006-0645
1015612
http://securitytracker.com/id?1015612
16568
http://www.securityfocus.com/bid/16568
18794
http://secunia.com/advisories/18794
18815
http://secunia.com/advisories/18815
18830
http://secunia.com/advisories/18830
18832
http://secunia.com/advisories/18832
18898
http://secunia.com/advisories/18898
18918
http://secunia.com/advisories/18918
19080
http://secunia.com/advisories/19080
19092
http://secunia.com/advisories/19092
2006-0008
http://www.trustix.org/errata/2006/0008
20060209 ProtoVer SSL: GnuTLS
http://www.securityfocus.com/archive/1/424538/100/0/threaded
23054
http://www.osvdb.org/23054
446
http://securityreason.com/securityalert/446
ADV-2006-0496
http://www.vupen.com/english/advisories/2006/0496
DSA-985
http://www.debian.org/security/2006/dsa-985
DSA-986
http://www.debian.org/security/2006/dsa-986
FEDORA-2006-107
http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00043.html
GLSA-200602-08
http://www.gentoo.org/security/en/glsa/glsa-200602-08.xml
MDKSA-2006:039
http://www.mandriva.com/security/advisories?name=MDKSA-2006:039
RHSA-2006:0207
http://rhn.redhat.com/errata/RHSA-2006-0207.html
USN-251-1
https://usn.ubuntu.com/251-1/
[gnutls-dev] 20060209 GnuTLS 1.2.10 - Security release
http://lists.gnupg.org/pipermail/gnutls-dev/2006-February/001059.html
[gnutls-dev] 20060209 GnuTLS 1.3.4 - Experimental - Security release
http://lists.gnupg.org/pipermail/gnutls-dev/2006-February/001060.html
[gnutls-dev] 20060209 Libtasn1 0.2.18 - Tiny ASN.1 Library - Security release
http://lists.gnupg.org/pipermail/gnutls-dev/2006-February/001058.html
gnutls-libtasn1-der-dos(24606)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24606
http://josefsson.org/cgi-bin/viewcvs.cgi/gnutls/tests/certder.c?view=markup
http://josefsson.org/cgi-bin/viewcvs.cgi/libtasn1/NEWS?root=gnupg-mirror&view=markup
http://josefsson.org/gnutls/releases/libtasn1/libtasn1-0.2.18-from-0.2.17.patch
http://www.gleg.net/protover_ssl.shtml
oval:org.mitre.oval:def:10540
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10540
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.