|
Family: Ubuntu Local Security Checks --> Category: infos
USN251-1 : libtasn1-2 vulnerability Vulnerability Scan
Vulnerability Scan Summary libtasn1-2 vulnerability
Detailed Explanation for this Vulnerability Test
Synopsis :
These remote packages are missing security patches :
- gnutls-bin
- libgnutls-doc
- libgnutls10
- libgnutls10-dev
- libgnutls11
- libgnutls11-dbg
- libgnutls11-dev
- libtasn1-2
- libtasn1-2-dev
Description :
Evgeny Legerov discovered a buffer overflow in the DER format decoding
function of the libtasn library. This library is mainly used by the
GNU TLS library
by sending a specially crafted X.509 certificate to a
server which uses TLS encryption/authentication, a remote attacker
could exploit this to crash that server process and possibly even
execute arbitrary code with the rights of that server.
In order to fix the vulnerability in libtasn, several internal
function signatures had to be changed
some of these functions are
used by the GNU TLS library, so that library needs to be updated as
well.
Solution :
Upgrade to :
- gnutls-bin-1.0.16-13.1ubuntu1.1 (Ubuntu 5.10)
- libgnutls-doc-1.0.4-3ubuntu1.2 (Ubuntu 4.10)
- libgnutls10-1.0.4-3ubuntu1.2 (Ubuntu 4.10)
- libgnutls10-dev-1.0.4-3ubuntu1.2 (Ubuntu 4.10)
- libgnutls11-1.0.16-13.1ubuntu1.1 (Ubuntu 5.10)
- libgnutls11-dbg-1.0.16-13.1ubuntu1.1 (Ubuntu 5.10)
- libgnutls11-dev-1.0.16-13.1ubuntu1.1 (Ubuntu 5.10)
- libtasn1-2-0.2.10-4ubuntu0.1 (Ubuntu 5.10)
- libtasn1-2-dev-0.2.10-4ubuntu0.1 (Ubuntu 5.10)
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|