Test ID: | 1.3.6.1.4.1.25623.1.0.69667 |
Category: | Mandrake Local Security Checks |
Title: | Mandriva Security Advisory MDVSA-2011:092 (perl-IO-Socket-SSL) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to perl-IO-Socket-SSL announced via advisory MDVSA-2011:092.
A vulnerability has been found and corrected in perl-IO-Socket-SSL:
IO::Socket::SSL Perl module 1.35, when verify_mode is not VERIFY_NONE, fails open to VERIFY_NONE instead of throwing an error when a ca_file/ca_path cannot be verified, which allows remote attackers to bypass intended certificate restrictions (CVE-2010-4334).
The updated packages have been patched to correct this issue.
Affected: 2010.1
Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2011:092
Risk factor : Medium
CVSS Score: 4.0
|
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2010-4334
42508
http://secunia.com/advisories/42508
42757
http://secunia.com/advisories/42757
45189
http://www.securityfocus.com/bid/45189
69626
http://osvdb.org/69626
FEDORA-2010-19054
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052594.html
FEDORA-2010-19058
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052601.html
MDVSA-2011:092
http://www.mandriva.com/security/advisories?name=MDVSA-2011:092
[oss-security] 20101209 Re: CVE requests: IO::Socket::SSL, cakephp, collectd, gnash, ocrodjvu, hypermail, libcloud, piwigo
http://www.openwall.com/lists/oss-security/2010/12/09/8
[oss-security] 20101224 IO::Socket::SSL perl module: CVE-2010-4501/CVE-2010-4334 dupe
http://www.openwall.com/lists/oss-security/2010/12/24/1
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606058
http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.35/Changes
|
Copyright | Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com |