jakarta security update

2013-02-20T02:59:36
ID CESA-2013:0270
Type centos
Reporter CentOS Project
Modified 2013-02-20T02:59:36

Description

CentOS Errata and Security Advisory CESA-2013:0270

The Jakarta Commons HttpClient component can be used to build HTTP-aware client applications (such as web browsers and web service clients).

The Jakarta Commons HttpClient component did not verify that the server hostname matched the domain name in the subject's Common Name (CN) or subjectAltName field in X.509 certificates. This could allow a man-in-the-middle attacker to spoof an SSL server if they had a certificate that was valid for any domain name. (CVE-2012-5783)

All users of jakarta-commons-httpclient are advised to upgrade to these updated packages, which correct this issue. Applications using the Jakarta Commons HttpClient component must be restarted for this update to take effect.

Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2013-February/019241.html

Affected packages: jakarta-commons-httpclient jakarta-commons-httpclient-demo jakarta-commons-httpclient-javadoc jakarta-commons-httpclient-manual

Upstream details at: https://rhn.redhat.com/errata/RHSA-2013-0270.html