Objavljena je revizija sigurnosne preporuke izvorne oznake USN-1197-1 u kojoj su ispravljene ranjivosti vezane uz uporabu neispravnih certifikata u programskom paketu Mozilla Firefox. Zlonamjerni korisnici mogli su iskoristiti tu ranjivost za pokretanje tzv. MITM (eng. man-in-the-middle) napada. Revizija je objavljena zbog pojave ranjivosti i u programskom paketu ca-certificates.
Paket:
ca-certificates 2.x
Operacijski sustavi:
Ubuntu Linux 10.04, Ubuntu Linux 10.10, Ubuntu Linux 11.04
Problem:
neodgovarajuća provjera ulaznih podataka
Iskorištavanje:
udaljeno
Posljedica:
izmjena podataka
Rješenje:
programska zakrpa proizvođača
Izvorni ID preporuke:
USN-1197-5
Izvor:
Ubuntu
Problem:
Problem se javlja zbog mogućnosti uporabe neispravnih certifikata koje je potpisalo certifikacijsko tijelo DigiNotar.
Posljedica:
Zlonamjerni, udaljeni korisnici mogu iskoristiti ovu ranjivost za pokretanje tzv. MITM (eng. man-in-the-middle) napada.
Rješenje:
Sporni certifikati dodani su na osvježenu listu neispravnih certifikata koja je objavljena u najnovijoj inačici programskog paketa ca-certificates.
==========================================================================
Ubuntu Security Notice USN-1197-5
September 09, 2011
ca-certificates vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS
Summary:
A certificate authority mis-issued fraudulent certificates.
Software Description:
- ca-certificates: Common CA certificates
Details:
USN-1197-1 addressed an issue in Firefox and Xulrunner pertaining to the
Dutch Certificate Authority DigiNotar mis-issuing fraudulent certificates.
This update provides the corresponding update for ca-certificates.
Original advisory details:
It was discovered that Dutch Certificate Authority DigiNotar, had
mis-issued multiple fraudulent certificates. These certificates could allow
an attacker to perform a "man in the middle" (MITM) attack which would make
the user believe their connection is secure, but is actually being
monitored.
For the protection of its users, Mozilla has removed the DigiNotar
certificate. Sites using certificates issued by DigiNotar will need to seek
another certificate vendor.
We are currently aware of a regression that blocks one of two Staat der
Nederlanden root certificates which are believed to still be secure. This
regression is being tracked at https://launchpad.net/bugs/838322.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 11.04:
ca-certificates 20090814+nmu2ubuntu0.1
Ubuntu 10.10:
ca-certificates 20090814ubuntu0.10.10.1
Ubuntu 10.04 LTS:
ca-certificates 20090814ubuntu0.10.04.1
After a standard system update you need to restart any application using
ca-certificates to make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1197-5
http://www.ubuntu.com/usn/usn-1197-1
https://launchpad.net/bugs/837557
Package Information:
https://launchpad.net/ubuntu/+source/ca-certificates/20090814+nmu2ubuntu0.1
https://launchpad.net/ubuntu/+source/ca-certificates/20090814ubuntu0.10.10.1
https://launchpad.net/ubuntu/+source/ca-certificates/20090814ubuntu0.10.04.1
Posljednje sigurnosne preporuke