Executive Summary

Summary
Title ca-certificates security update
Informations
Name DSA-2299 First vendor Publication 2011-08-31
Vendor Debian Last vendor Modification 2011-08-31
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score Not Defined Attack Range Not Defined
Cvss Impact Score Not Defined Attack Complexity Not Defined
Cvss Expoit Score Not Defined Authentication Not Defined
Calculate full CVSS 2.0 Vectors scores

Detail

An unauthorized SSL certificate has been found in the wild issued the DigiNotar Certificate Authority, obtained through a security compromise with said company. Debian, like other software distributors, has as a precaution decided to disable the DigiNotar Root CA by default in its ca-certificates bundle.

For other software in Debian that ships a CA bundle, like the Mozilla suite, updates are forthcoming.

For the oldstable distribution (lenny), the ca-certificates package does not contain this root CA.

For the stable distribution (squeeze), the root CA has been disabled starting ca-certificates version 20090814+nmu3.

For the testing distribution (wheezy) and unstable distribution (sid), the root CA has been disabled starting ca-certificates version 20110502+nmu1.

We recommend that you upgrade your ca-certificates packages.

Original Source

Url : http://www.debian.org/security/2011/dsa-2299

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:30:24
  • Multiple Updates