Ubuntu Security Notice (C) 2011-2016 Canonical, Inc. / NASL script (C) 2011-2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing a security-related patch.
USN-1197-1 and USN-1197-3 addressed an issue in Firefox and Xulrunner
pertaining to the Dutch Certificate Authority DigiNotar mis-issuing
fraudulent certificates. This update provides an update for Qt that
blacklists the known fraudulent certificates.
It was discovered that Dutch Certificate Authority DigiNotar
had mis-issued multiple fraudulent certificates. These
certificates could allow an attacker to perform a 'man in
the middle' (MITM) attack which would make the user believe
their connection is secure, but is actually being monitored.
For the protection of its users, Mozilla has removed the
DigiNotar certificate. Sites using certificates issued by
DigiNotar will need to seek another certificate vendor.
We are currently aware of a regression that blocks one of
two Staat der Nederlanden root certificates which are
believed to still be secure. This regression is being
tracked at https://launchpad.net/bugs/838322.
USN-1197-1 partially addressed an issue with Dutch
Certificate Authority DigiNotar mis-issuing fraudulent
certificates. This update actively distrusts the DigiNotar
root certificate as well as several intermediary
certificates. Also included in this list of distrusted
certificates are the 'PKIOverheid' (PKIGovernment)
intermediates under DigiNotar's control that did not chain
to DigiNotar's root and were not previously blocked.
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected libqt4-network package.
Risk factor :
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now