<?xml version="1.0" encoding="utf-8"?> <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> <glsa id="200901-10"> <title>GnuTLS: Certificate validation error</title> <synopsis> A certificate validation error in GnuTLS might allow for spoofing attacks. </synopsis> <product type="ebuild">gnutls</product> <announced>2009-01-14</announced> <revised count="01">2009-01-14</revised> <bug>245850</bug> <access>remote</access> <affected> <package name="net-libs/gnutls" auto="yes" arch="*"> <unaffected range="ge">2.4.1-r2</unaffected> <vulnerable range="lt">2.4.1-r2</vulnerable> </package> </affected> <background> <p> GnuTLS is an open-source implementation of TLS 1.0 and SSL 3.0. </p> </background> <description> <p> Martin von Gagern reported that the _gnutls_x509_verify_certificate() function in lib/x509/verify.c trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate. </p> </description> <impact type="normal"> <p> A remote attacker could exploit this vulnerability and spoof arbitrary names to conduct Man-In-The-Middle attacks and intercept sensitive information. </p> </impact> <workaround> <p> There is no known workaround at this time. </p> </workaround> <resolution> <p> All GnuTLS users should upgrade to the latest version: </p> <code> # emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/gnutls-2.4.1-r2"</code> </resolution> <references> <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4989">CVE-2008-4989</uri> </references> <metadata tag="requester" timestamp="2008-11-30T19:06:26Z"> keytoaster </metadata> <metadata tag="submitter" timestamp="2009-01-10T23:37:58Z"> p-y </metadata> <metadata tag="bugReady" timestamp="2009-01-10T23:38:09Z"> p-y </metadata> </glsa>