Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.64785
Kategorie:FreeBSD Local Security Checks
Titel:FreeBSD Ports: gnutls
Zusammenfassung:The remote host is missing an update to the system; as announced in the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following packages are affected:

gnutls
gnutls-devel

CVE-2009-1415
lib/pk-libgcrypt.c in libgnutls in GnuTLS before 2.6.6 does not
properly handle invalid DSA signatures, which allows remote attackers
to cause a denial of service (application crash) and possibly have
unspecified other impact via a malformed DSA key that triggers a (1)
free of an uninitialized pointer or (2) double free.

CVE-2009-1416
lib/gnutls_pk.c in libgnutls in GnuTLS 2.5.0 through 2.6.5 generates
RSA keys stored in DSA structures, instead of the intended DSA keys,
which might allow remote attackers to spoof signatures on certificates
or have unspecified other impact by leveraging an invalid DSA key.

CVE-2009-1417
gnutls-cli in GnuTLS before 2.6.6 does not verify the activation and
expiration times of X.509 certificates, which allows remote attackers
to successfully present a certificate that is (1) not yet valid or (2)
no longer valid, related to lack of time checks in the
_gnutls_x509_verify_certificate function in lib/x509/verify.c in
libgnutls_x509, as used by (a) Exim, (b) OpenLDAP, and (c) libsoup.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2009-1415
BugTraq ID: 34783
http://www.securityfocus.com/bid/34783
http://security.gentoo.org/glsa/glsa-200905-04.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:116
http://permalink.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3502
http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3515
http://www.securitytracker.com/id?1022157
http://secunia.com/advisories/34842
http://secunia.com/advisories/35211
http://www.vupen.com/english/advisories/2009/1218
XForce ISS Database: gnutls-dsa-code-execution(50257)
https://exchange.xforce.ibmcloud.com/vulnerabilities/50257
XForce ISS Database: gnutls-dsa-dos(50260)
https://exchange.xforce.ibmcloud.com/vulnerabilities/50260
XForce ISS Database: gnutls-libgnutls-dos(50445)
https://exchange.xforce.ibmcloud.com/vulnerabilities/50445
Common Vulnerability Exposure (CVE) ID: CVE-2009-1416
http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3516
http://lists.gnu.org/archive/html/help-gnutls/2009-04/msg00018.html
http://www.securitytracker.com/id?1022158
Common Vulnerability Exposure (CVE) ID: CVE-2009-1417
http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3517
http://www.securitytracker.com/id?1022159
XForce ISS Database: gnutls-gnutlscli-spoofing(50261)
https://exchange.xforce.ibmcloud.com/vulnerabilities/50261
CopyrightCopyright (C) 2009 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.