Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.66291
Category:Fedora Local Security Checks
Title:Fedora Core 10 FEDORA-2009-11666 (proftpd)
Summary:The remote host is missing an update to proftpd;announced via advisory FEDORA-2009-11666.;Note: This VT has been deprecated and is therefore no longer functional.
Description:Summary:
The remote host is missing an update to proftpd
announced via advisory FEDORA-2009-11666.
Note: This VT has been deprecated and is therefore no longer functional.

Vulnerability Insight:
Update Information:

This update fixes CVE-2009-3639, in which proftpd's mod_tls, when the
dNSNameRequired TLS option is enabled, does not properly handle a '\0' character
in a domain name in the Subject Alternative Name field of an X.509 client
certificate. This allows remote attackers to bypass intended client-hostname
restrictions via a crafted certificate issued by a legitimate Certification
Authority.

ChangeLog:

* Wed Oct 21 2009 Paul Howarth 1.3.2b-1

- Update to 1.3.2b

- Fixed regression causing command-line define options not to work (bug 3221)

- Fixed SSL/TLS cert subjectAltName verification (bug 3275, CVE-2009-3639)

- Use correct cached user values with SQLNegativeCache on (bug 3282)

- Fix slower transfers of multiple small files (bug 3284)

- Support MaxTransfersPerHost, MaxTransfersPerUser properly (bug 3287)

- Handle symlinks to directories with trailing slashes properly (bug 3297)

- Drop upstreamed defines patch (bug 3221)

Solution:
Apply the appropriate updates.

This update can be installed with the yum update program. Use
su -c 'yum update proftpd' at the command line.

CVSS Score:
5.8

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-3639
36804
http://www.securityfocus.com/bid/36804
37131
http://secunia.com/advisories/37131
37219
http://secunia.com/advisories/37219
DSA-1925
http://www.debian.org/security/2009/dsa-1925
FEDORA-2009-11649
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00642.html
FEDORA-2009-11666
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00649.html
MDVSA-2009:288
http://www.mandriva.com/security/advisories?name=MDVSA-2009:288
[oss-security] 20091023 Re: proftpd - mod_tls - Improper SSL/TLS certificate subjectAltName verification
http://marc.info/?l=oss-security&m=125632960508211&w=2
[oss-security] 20091023 proftpd - mod_tls - Improper SSL/TLS certificate subjectAltName verification
http://marc.info/?l=oss-security&m=125630966510672&w=2
http://bugs.proftpd.org/show_bug.cgi?id=3275
https://bugzilla.redhat.com/show_bug.cgi?id=530719
proftpd-modtls-security-bypass(53936)
https://exchange.xforce.ibmcloud.com/vulnerabilities/53936
CopyrightCopyright (C) 2009 E-Soft Inc.

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.