Mandriva Linux Security Advisory : kdelibs4 (MDVSA-2011:071)

This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing one or more security
updates.

Description :

A vulnerability has been found and corrected in kdelibs4 :

kio/kio/tcpslavebase.cpp in KDE KSSL in kdelibs before 4.6.1 does not
properly verify that the server hostname matches the domain name of
the subject of an X.509 certificate, which allows man-in-the-middle
attackers to spoof arbitrary SSL servers via a certificate issued by a
legitimate Certification Authority for an IP address, a different
vulnerability than CVE-2009-2702 (CVE-2011-1094).

Additionally it was discovered that kdelibs4 for 2009.0 was using an
old private copy of the ca-bundle.crt file containing the root CA
certs, this has now been resolved so that it uses the system wide and
up to date /etc/pki/tls/certs/ca-bundle.crt file last updated with the
MDVSA-2011:068 advisory.

Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149 products_id=490

The updated packages have been patched to correct this issue.

See also :

http://www.mandriva.com/security/advisories?name=MDVSA-2011:068

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Mandriva Local Security Checks

Nessus Plugin ID: 53350 ()

Bugtraq ID: 46789

CVE ID: CVE-2011-1094

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now