Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.64941
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2009:1452
Summary:NOSUMMARY
Description:Description:
The remote host is missing updates announced in
advisory RHSA-2009:1452.

neon is an HTTP and WebDAV client library, with a C interface. It provides
a high-level interface to HTTP and WebDAV methods along with a low-level
interface for HTTP request handling. neon supports persistent connections,
proxy servers, basic, digest and Kerberos authentication, and has complete
SSL support.

It was discovered that neon is affected by the previously published null
prefix attack, caused by incorrect handling of NULL characters in X.509
certificates. If an attacker is able to get a carefully-crafted certificate
signed by a trusted Certificate Authority, the attacker could use the
certificate during a man-in-the-middle attack and potentially confuse an
application using the neon library into accepting it by mistake.
(CVE-2009-2474)

A denial of service flaw was found in the neon Extensible Markup Language
(XML) parser. A remote attacker (malicious DAV server) could provide a
specially-crafted XML document that would cause excessive memory and CPU
consumption if an application using the neon XML parser was tricked into
processing it. (CVE-2009-2473)

All neon users should upgrade to these updated packages, which contain
backported patches to correct these issues. Applications using the neon
HTTP and WebDAV client library, such as cadaver, must be restarted for this
update to take effect.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2009-1452.html
http://www.redhat.com/security/updates/classification/#moderate

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-2473
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00924.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00945.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:221
http://lists.manyfish.co.uk/pipermail/neon/2009-August/001045.html
http://lists.manyfish.co.uk/pipermail/neon/2009-August/001044.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9461
RedHat Security Advisories: RHSA-2013:0131
http://rhn.redhat.com/errata/RHSA-2013-0131.html
http://secunia.com/advisories/36371
SuSE Security Announcement: SUSE-SR:2009:018 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html
http://www.vupen.com/english/advisories/2009/2341
XForce ISS Database: neon-xml-dos(52633)
https://exchange.xforce.ibmcloud.com/vulnerabilities/52633
Common Vulnerability Exposure (CVE) ID: CVE-2009-2474
BugTraq ID: 36079
http://www.securityfocus.com/bid/36079
http://lists.manyfish.co.uk/pipermail/neon/2009-August/001046.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11721
http://secunia.com/advisories/36799
http://www.ubuntu.com/usn/usn-835-1
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.