nspr-4.7.4-1AXS3.1
エラータID: AXSA:2009-368:02
リリース日:
2009/08/19 Wednesday - 12:32
題名:
nspr-4.7.4-1AXS3.1
影響のあるチャネル:
Asianux Server 3 for x86
Asianux Server 3 for x86_64
Severity:
High
Description:
- Seamonkey の正規表現パーサにヒープベースのバッファーオーバーフローが存在し、X.509 認証の 主体者の一般名フィールドの長いドメイン名によってリモートの SSL サーバがサービス拒否 (アプリケーションのクラッシュ) を引き起こしたり、任意のコードを実行する可能性のある脆弱性があります。(CVE-2009-2404)
- Seamonkey はX.509認証の主体者の一般名のフィールドのドメイン名でヌル文字を適切に処理できない問題があり、中間者攻撃を行う攻撃者が合法的な認証局によって発行された巧妙に作られた証明書によって任意のSSL サーバ になりすます脆弱性があります。(CVE-2009-2408)
- Firefox で使われている NSS ライブラリは、X.509 証明書のMD2 をサポートしていますが、リモートの攻撃者が総当たり攻撃よりも短い時間でハッシュ衝突を生成するMD2 デザインフローを用いて証明書を偽る可能性のある脆弱性を修正しました。(CVE-2009-2409)
一部CVEの翻訳文はJVNからの引用になります。
http://jvndb.jvn.jp/
解決策:
本パッケージと nss-3.12.3.99.3-1AXS3.2 を併せてアップデートしてください。
CVE:
CVE-2009-2404
Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.
Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.
CVE-2009-2408
Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
CVE-2009-2409
The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.
The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.
追加情報:
Asianux Server 3 SP2 からのアップデートパッケージです。
ダウンロード:
SRPMS
- nspr-4.7.4-1AXS3.1.src.rpm
MD5: e688ed56f4607797ac2640e9f163ac0e
SHA-256: 66febe28c8d00890591561f4020b9b59acc8028d2066c32bcd51b98f2681109d
Size: 966.81 kB