Vulnerability Bulletins |
Suplantación de identidad en GNU Wget |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Aumento de privilegios |
Dificulty | Experto |
Required attacker level | Acceso remoto sin cuenta a un servicio estandar |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software | GNU Wget < 1.12 |
Description |
|
Se ha descubierto una vulnerabilidad en GNU Wget 1.12. La vulnerabilidad reside en un error en el manejo del carácter "\0" en el campo "Common Name" en un certificado X.509. Un atacante remoto podría realizar ataques de suplantación de identidad a servidores SSL mediante un certificado especialmente diseñado. |
|
Solution |
|
Actualización de software Debian (DSA-1904-1) Debian Linux 4.0 Source http://security.debian.org/pool/updates/main/w/wget/wget_1.10.2-2+etch1.diff.gz http://security.debian.org/pool/updates/main/w/wget/wget_1.10.2.orig.tar.gz http://security.debian.org/pool/updates/main/w/wget/wget_1.10.2-2+etch1.dsc alpha (DEC Alpha) http://security.debian.org/pool/updates/main/w/wget/wget_1.10.2-2+etch1_alpha.deb amd64 (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/w/wget/wget_1.10.2-2+etch1_amd64.deb arm (ARM) http://security.debian.org/pool/updates/main/w/wget/wget_1.10.2-2+etch1_arm.deb hppa (HP PA RISC) http://security.debian.org/pool/updates/main/w/wget/wget_1.10.2-2+etch1_hppa.deb i386 (Intel ia32) http://security.debian.org/pool/updates/main/w/wget/wget_1.10.2-2+etch1_i386.deb ia64 (Intel ia64) http://security.debian.org/pool/updates/main/w/wget/wget_1.10.2-2+etch1_ia64.deb mipsel (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/w/wget/wget_1.10.2-2+etch1_mipsel.deb powerpc (PowerPC) http://security.debian.org/pool/updates/main/w/wget/wget_1.10.2-2+etch1_powerpc.deb s390 (IBM S/390) http://security.debian.org/pool/updates/main/w/wget/wget_1.10.2-2+etch1_s390.deb sparc (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/w/wget/wget_1.10.2-2+etch1_sparc.deb Debian (DSA-1904-1) Debian Linux 5.0 Source http://security.debian.org/pool/updates/main/w/wget/wget_1.11.4-2+lenny1.dsc http://security.debian.org/pool/updates/main/w/wget/wget_1.11.4.orig.tar.gz http://security.debian.org/pool/updates/main/w/wget/wget_1.11.4-2+lenny1.diff.gz alpha (DEC Alpha) http://security.debian.org/pool/updates/main/w/wget/wget_1.11.4-2+lenny1_alpha.deb amd64 (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/w/wget/wget_1.11.4-2+lenny1_amd64.deb arm (ARM) http://security.debian.org/pool/updates/main/w/wget/wget_1.11.4-2+lenny1_arm.deb armel (ARM EABI) http://security.debian.org/pool/updates/main/w/wget/wget_1.11.4-2+lenny1_armel.deb hppa (HP PA RISC) http://security.debian.org/pool/updates/main/w/wget/wget_1.11.4-2+lenny1_hppa.deb i386 (Intel ia32) http://security.debian.org/pool/updates/main/w/wget/wget_1.11.4-2+lenny1_i386.deb ia64 (Intel ia64) http://security.debian.org/pool/updates/main/w/wget/wget_1.11.4-2+lenny1_ia64.deb mips (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/w/wget/wget_1.11.4-2+lenny1_mips.deb mipsel (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/w/wget/wget_1.11.4-2+lenny1_mipsel.deb powerpc (PowerPC) http://security.debian.org/pool/updates/main/w/wget/wget_1.11.4-2+lenny1_powerpc.deb s390 (IBM S/390) http://security.debian.org/pool/updates/main/w/wget/wget_1.11.4-2+lenny1_s390.deb sparc (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/w/wget/wget_1.11.4-2+lenny1_sparc.deb Red Hat (RHSA-2009:1549-1) Red Hat Desktop (v. 3) Red Hat Desktop (v. 4) Red Hat Enterprise Linux (v. 5 servidor) Red Hat Enterprise Linux AS (v. 3) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux AS (v. 4.8.z) Red Hat Enterprise Linux Desktop (v. 5 cliente) Red Hat Enterprise Linux ES (v. 3) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux ES (v. 4.8.z) Red Hat Enterprise Linux EUS (v. 5.4.z servidor) Red Hat Enterprise Linux WS (v. 3) Red Hat Enterprise Linux WS (v. 4) https://rhn.redhat.com/ Sun (273590) Solaris 10 / SPARC / patch 125215-03 Solaris 10 / x86 / patch 125216-03 OpenSolaris / upon builds snv_126 o posterior http://sunsolve.sun.com/pub-cgi/show.pl?target=patchpage |
|
Standar resources |
|
Property | Value |
CVE | CVE-2009-3490 |
BID | 36205 |
Other resources |
|
Debian Security Advisory (DSA-1904-1) http://lists.debian.org/debian-security-announce/2009/msg00225.html Red Hat Security Advisory (RHSA-2009:1549-1) https://rhn.redhat.com/errata/RHSA-2009-1549.html Sun Alert Notification (273590) http://sunsolve.sun.com/search/document.do?assetkey=1-66-273590-1 |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2009-10-09 |
1.1 | Aviso emitido por Red Hat (RHSA-2009:1549-1) | 2009-11-17 |
1.2 | Aviso emitido por Sun (273590) | 2009-12-19 |