Summary
The remote host is missing an update to xmlsec1
announced via advisory MDVSA-2009:318.
Solution
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:318 http://www.kb.cert.org/vuls/id/466161
Insight
Multiple security vulnerabilities has been identified and fixed in xmlsec1:
A missing check for the recommended minimum length of the truncated form of HMAC-based XML signatures was found in xmlsec1 prior to 1.2.12. An attacker could use this flaw to create a specially-crafted XML file that forges an XML signature, allowing the attacker to bypass authentication that is based on the XML Signature specification (CVE-2009-0217).
All versions of libtool prior to 2.2.6b suffers from a local privilege escalation vulnerability that could be exploited under certain conditions to load arbitrary code (CVE-2009-3736).
Packages for 2008.0 are being provided due to extended support for Corporate products.
This update fixes this vulnerability.
Affected: 2008.0
Severity
Classification
-
CVE CVE-2009-0217, CVE-2009-3736 -
CVSS Base Score: 6.9
AV:L/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities