Summary
The remote host is missing an update to gnutls11
announced via advisory DSA 1182-1.
Daniel Bleichenbacher discovered a flaw in GNU TLS cryptographic package that could allow an attacker to generate a forged signature that GNU TLS will accept as valid.
Solution
For the stable distribution (sarge) this problem has been fixed in version 1.0.16-13.2sarge2.
The unstable distribution (sid) does no longer contain gnutls11, for gnutls13 this problem has been fixed in version 1.4.4-1.
We recommend that you upgrade your GNU TLS package.
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201182-1
Severity
Classification
-
CVE CVE-2006-4790 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:P/A:N
Related Vulnerabilities