Otkriven je niz kompromitiranih certifikata koje je izdalo certifikacijsko tijelo DigiNotar. Navedeni certifikati koriste se u aplikacijama Xulrunner i Firefox, te omogućuju zlonamjernom korisniku pokretanje "Man in the middle" napada.
Paket:
Firefox 3.x, Firefox 6.x, Xulrunner 1.x
Operacijski sustavi:
Ubuntu Linux 10.04, Ubuntu Linux 10.10, Ubuntu Linux 11.04
Problem:
neodgovarajuće rukovanje datotekama
Iskorištavanje:
lokalno/udaljeno
Posljedica:
otkrivanje osjetljivih informacija
Rješenje:
programska zakrpa proizvođača
Izvorni ID preporuke:
USN-1197-1
Izvor:
Ubuntu
Problem:
Certifikacijsko tijelo DigiNotar sigurnosno je komprimitirano te je izdalo niz neispravnih SSL certifikata.
Posljedica:
Uočena ranjivost može se iskoristiti za pokretanje napada "Man in the middle" pomoću kojeg udaljeni napadač može žrtvu zavarati da misli da je uspostavila sigurnu komunikaciju, a u biti treća strana ima uvid u podatke koji se razmjenjuju.
Rješenje:
Svim korisnicima savjetuje se instalacija novih inačica opisanih aplikacija.
==========================================================================
Ubuntu Security Notice USN-1197-1
September 01, 2011
firefox, xulrunner-1.9.2 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS
Summary:
A certificate authority issued fraudulent certificates.
Software Description:
- firefox: Mozilla Open Source web browser
- xulrunner-1.9.2: Mozilla Gecko runtime environment
Details:
It was discovered that Dutch Certificate Authority DigiNotar, had
mis-issued multiple fraudulent certificates. These certificates could allow
an attacker to perform a "man in the middle" (MITM) attack which would make
the user believe their connection is secure, but is actually being
monitored.
For the protection of its users, Mozilla has removed the DigiNotar
certificate. Sites using certificates issued by DigiNotar will need to seek
another certificate vendor.
We are currently aware of a regression that blocks one of two Staat der
Nederlanden root certificates which are believed to still be secure. This
regression is being tracked at https://launchpad.net/bugs/838322.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 11.04:
firefox 6.0.1+build1+nobinonly-0ubuntu0.11.04.1
Ubuntu 10.10:
firefox 3.6.21+build1+nobinonly-0ubuntu0.10.10.1
xulrunner-1.9.2 1.9.2.21+build1+nobinonly-0ubuntu0.10.10.1
Ubuntu 10.04 LTS:
firefox 3.6.21+build1+nobinonly-0ubuntu0.10.04.1
xulrunner-1.9.2 1.9.2.21+build1+nobinonly-0ubuntu0.10.04.1
After a standard system upgrade you need to restart Firefox and any
applications that use Xulrunner to effect the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1197-1
https://launchpad.net/bugs/837557, https://launchpad.net/bugs/838322
Package Information:
https://launchpad.net/ubuntu/+source/firefox/6.0.1+build1+nobinonly-0ubuntu0.11.04.1
https://launchpad.net/ubuntu/+source/firefox/3.6.21+build1+nobinonly-0ubuntu0.10.10.1
https://launchpad.net/ubuntu/+source/xulrunner-1.9.2/1.9.2.21+build1+nobinonly-0ubuntu0.10.10.1
https://launchpad.net/ubuntu/+source/firefox/3.6.21+build1+nobinonly-0ubuntu0.10.04.1
https://launchpad.net/ubuntu/+source/xulrunner-1.9.2/1.9.2.21+build1+nobinonly-0ubuntu0.10.04.1
Posljednje sigurnosne preporuke