[Secure-testing-team] Bug#684511: libpython2.6: CVE-2011-3389 - SSL man-in-the-middle attack
aw at linux.de
aw at linux.de
Fri Aug 10 16:19:26 UTC 2012
Package: libpython2.6
Version: 2.6.6-8
Severity: important
Tags: security, squeeze
Justification: user security hole
CVE-2011-3389 is fixed in unstable/testing, but not in stable, yet:
The SSL protocol [...] encrypts data by using CBC mode with chained
initialization vectors, which allows man-in-the-middle attackers to obtain
plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an
HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5
WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient
API, aka a "BEAST" attack.
cu
AW
-- System Information:
Debian Release: 6.0.5
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable'), (50, 'proposed-updates')
Architecture: i386 (i686)
Kernel: Linux 2.6.32-5-686 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=de_DE (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/dash
Versions of packages libpython2.6 depends on:
ii libc6 2.11.3-4 Embedded GNU C Library: Shared lib
ii libssl0.9.8 0.9.8o-4squeeze13 SSL shared libraries
ii python2.6 2.6.6-8 An interactive high-level object-o
ii zlib1g 1:1.2.3.4.dfsg-3 compression library - runtime
libpython2.6 recommends no packages.
libpython2.6 suggests no packages.
-- no debconf information
More information about the Secure-testing-team
mailing list