SCIENTIFIC-LINUX-ERRATA Archives

November 2009

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Sender:
Security Errata for Scientific Linux <[log in to unmask]>
Date:
Wed, 4 Nov 2009 15:27:26 -0600
MIME-version:
1.0
Reply-To:
Troy Dawson <[log in to unmask]>
Content-type:
text/plain; format=flowed; charset=ISO-8859-1
Subject:
From:
Troy Dawson <[log in to unmask]>
Content-transfer-encoding:
7BIT
Comments:
Parts/Attachments:
text/plain (44 lines)
Synopsis:	Moderate: wget security update
Issue date:	2009-11-03
CVE Names:	CVE-2009-3490

CVE-2009-3490 wget: incorrect verification of SSL certificate with NUL 
in name

Daniel Stenberg reported that Wget is affected by the previously 
published "null prefix attack", caused by incorrect handling of NULL 
characters in X.509 certificates. If an attacker is able to get a 
carefully-crafted certificate signed by a trusted Certificate Authority, 
the attacker could use the certificate during a man-in-the-middle attack 
and potentially confuse Wget into accepting it by mistake. (CVE-2009-3490)

SL 3.0.x

       SRPMS:
wget-1.10.2-0.30E.1.src.rpm
       i386:
wget-1.10.2-0.30E.1.i386.rpm
       x86_64:
wget-1.10.2-0.30E.1.x86_64.rpm

SL 4.x

       SRPMS:
wget-1.10.2-1.el4_8.1.src.rpm
       i386:
wget-1.10.2-1.el4_8.1.i386.rpm
       x86_64:
wget-1.10.2-1.el4_8.1.x86_64.rpm

SL 5.x

       SRPMS:
wget-1.11.4-2.el5_4.1.src.rpm
       i386:
wget-1.11.4-2.el5_4.1.i386.rpm
       x86_64:
wget-1.11.4-2.el5_4.1.x86_64.rpm

-Connie Sieh
-Troy Dawson

ATOM RSS1 RSS2