RHEL 6 : devtoolset-2-httpcomponents-client (RHSA-2014:1098)

This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated devtoolset-2-httpcomponents-client packages that fix one
security issue are now available for Red Hat Developer Toolset 2.

Red Hat Product Security has rated this update as having Important
security impact. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available from the
CVE link in the References section.

HttpClient is an HTTP/1.1 compliant HTTP agent implementation based on
httpcomponents HttpCore.

It was discovered that the HttpClient incorrectly extracted host name
from an X.509 certificate subject's Common Name (CN) field. A
man-in-the-middle attacker could use this flaw to spoof an SSL server
using a specially crafted X.509 certificate. (CVE-2012-6153)

This issue was discovered by Florian Weimer of Red Hat Product
Security.

For additional information on this flaw, refer to the Knowledgebase
article in the References section.

All devtoolset-2-httpcomponents-client users are advised to upgrade to
these updated packages, which contain a backported patch to correct
this issue.

See also :

https://www.redhat.com/security/data/cve/CVE-2012-6153.html
https://access.redhat.com/solutions/1165533
http://rhn.redhat.com/errata/RHSA-2014-1098.html

Solution :

Update the affected devtoolset-2-httpcomponents-client and / or
devtoolset-2-httpcomponents-client-javadoc packages.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Red Hat Local Security Checks

Nessus Plugin ID: 79042 ()

Bugtraq ID: 69257

CVE ID: CVE-2012-6153

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now