Ubuntu Security Notice (C) 2011-2016 Canonical, Inc. / NASL script (C) 2011-2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing one or more security-related
USN-1197-1 partially addressed an issue with Dutch Certificate
Authority DigiNotar mis-issuing fraudulent certificates. This update
actively distrusts the DigiNotar root certificate as well as several
intermediary certificates. Also included in this list of distrusted
certificates are the 'PKIOverheid' (PKIGovernment) intermediates under
DigiNotar's control that did not chain to DigiNotar's root and were
not previously blocked.
It was discovered that Dutch Certificate Authority DigiNotar, had
mis-issued multiple fraudulent certificates. These certificates could
allow an attacker to perform a 'man in the middle' (MITM) attack which
would make the user believe their connection is secure, but is
actually being monitored.
For the protection of its users, Mozilla has removed the
DigiNotar certificate. Sites using certificates issued by
DigiNotar will need to seek another certificate vendor.
We are currently aware of a regression that blocks one of
two Staat der Nederlanden root certificates which are
believed to still be secure. This regression is being
tracked at https://launchpad.net/bugs/838322.
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected firefox and / or xulrunner-1.9.2 packages.
Risk factor :
Family: Ubuntu Local Security Checks
Nessus Plugin ID: 56115 ()
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.