Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.57366
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2006:0680
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2006:0680.

The GnuTLS Library provides support for cryptographic algorithms and
protocols such as TLS. GnuTLS includes libtasn1, a library developed for
ASN.1 structures management that includes DER encoding and decoding.

Daniel Bleichenbacher recently described an attack on PKCS #1 v1.5
signatures. Where an RSA key with exponent 3 is used it may be possible for
an attacker to forge a PKCS #1 v1.5 signature that would be incorrectly
verified by implementations that do not check for excess data in the RSA
exponentiation result of the signature.

The core GnuTLS team discovered that GnuTLS is vulnerable to a variant of
the Bleichenbacker attack. This issue affects applications that use GnuTLS
to verify X.509 certificates as well as other uses of PKCS #1 v1.5.
(CVE-2006-4790)

In Red Hat Enterprise Linux 4, the GnuTLS library is only used by the
Evolution client when connecting to an Exchange server or when publishing
calendar information to a WebDAV server.

Users are advised to upgrade to these updated packages, which contain a
backported patch from the GnuTLS maintainers to correct this issue.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2006-0680.html
http://www.redhat.com/security/updates/classification/#important

Risk factor : Medium

CVSS Score:
5.0

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2006-4790
1016844
http://securitytracker.com/id?1016844
102648
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1
102970
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102970-1
20027
http://www.securityfocus.com/bid/20027
21937
http://secunia.com/advisories/21937
21942
http://secunia.com/advisories/21942
21973
http://secunia.com/advisories/21973
22049
http://secunia.com/advisories/22049
22080
http://secunia.com/advisories/22080
22084
http://secunia.com/advisories/22084
22097
http://secunia.com/advisories/22097
22226
http://secunia.com/advisories/22226
22992
http://secunia.com/advisories/22992
25762
http://secunia.com/advisories/25762
ADV-2006-3635
http://www.vupen.com/english/advisories/2006/3635
ADV-2006-3899
http://www.vupen.com/english/advisories/2006/3899
ADV-2007-2289
http://www.vupen.com/english/advisories/2007/2289
DSA-1182
http://www.debian.org/security/2006/dsa-1182
GLSA-200609-15
http://security.gentoo.org/glsa/glsa-200609-15.xml
MDKSA-2006:166
http://www.mandriva.com/security/advisories?name=MDKSA-2006:166
RHSA-2006:0680
http://www.redhat.com/support/errata/RHSA-2006-0680.html
SUSE-SA:2007:010
http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html
SUSE-SR:2006:023
http://www.novell.com/linux/security/advisories/2006_23_sr.html
USN-348-1
http://www.ubuntu.com/usn/usn-348-1
[gnutls-dev] 20060908 Variant of Bleichenbacher's crypto 06 rump session attack
http://lists.gnupg.org/pipermail/gnutls-dev/2006-September/001205.html
[gnutls-dev] 20060912 Re: Variant of Bleichenbacher's crypto 06 rump session attack
http://lists.gnupg.org/pipermail/gnutls-dev/2006-September/001212.html
gnutls-rsakey-security-bypass(28953)
https://exchange.xforce.ibmcloud.com/vulnerabilities/28953
http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm
http://www.gnu.org/software/gnutls/security.html
oval:org.mitre.oval:def:9937
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9937
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.