Bug#539901: CVE-2009-2409: spoof certificates by using MD2 design flaws

Giuseppe Iuculano giuseppe at iuculano.it
Tue Aug 4 10:25:33 UTC 2009


Package: gnutls26
Version: 2.4.2-6+lenny1
Severity: important
Tags: security patch lenny

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for gnutls26.

CVE-2009-2409[0]:
| The NSS library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4
| and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support
| MD2 with X.509 certificates, which might allow remote attackers to
| spoof certificates by using MD2 design flaws to generate a hash
| collision in less than brute-force time.  NOTE: the scope of this
| issue is currently limited because the amount of computation required
| is still large.

Since 2.6.4 and 2.7.4 MD2 hasn't been allowed by default in a chain, so only
the lenny version is affected.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409
    http://security-tracker.debian.net/tracker/CVE-2009-2409


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkp4DJMACgkQNxpp46476aremACffxyiPN5YkbSlk2KOxkhEu1lH
kkEAoJYwhbLbk6BnXub0d2mOguNf84b6
=M9fX
-----END PGP SIGNATURE-----





More information about the Pkg-gnutls-maint mailing list