SciLinux: CVE-2009-2409 Moderate: gnutls SL4.x, SL5.x i386/x86_64
Summary
decoding from ASN1 (BE64) [GNUTLS-SA-2010-1]A flaw was found in the way the TLS/SSL (Transport Layer Security/SecureSockets Layer) protocols handled session renegotiation. Aman-in-the-middle attacker could use this flaw to prefix arbitrary plaintext to a client's session (for example, an HTTPS connection to awebsite). This could force the server to process an attacker's requestas if authenticated using the victim's credentials. This updateaddresses this flaw by implementing the TLS Renegotiation IndicationExtension, as defined in RFC 5746. (CVE-2009-3555)Refer to the following Knowledgebase article for additional detailsabout the CVE-2009-3555 flaw:Dan Kaminsky found that browsers could accept certificates with MD2 hashsignatures, even though MD2 is no longer considered a cryptographicallystrong algorithm. This could make it easier for an attacker to create amalicious certificate that would be treated as trusted by a browser.GnuTLS now disables the use of the MD2 algorithm inside signatures bydefault. (CVE-2009-2409) SL5 OnlyA flaw was found in the way GnuTLS extracted serial numbers from X.509certificates. On 64-bit big endian platforms, this flaw could cause thecertificate revocation list (CRL) check to be bypassed; cause variousGnuTLS utilities to crash; or, possibly, execute arbitrary code.(CVE-2010-0731) SL4 OnlyFor the update to take effect, all applications linked to the GnuTLSlibrary must be restarted, or the system rebooted.