Lucene search

K
suseSuseOPENSUSE-SU-2020:1875-1
HistoryNov 08, 2020 - 12:00 a.m.

Security update for apache-commons-httpclient (important)

2020-11-0800:00:00
lists.opensuse.org
38

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

An update that fixes two vulnerabilities is now available.

Description:

This update for apache-commons-httpclient fixes the following issues:

  • http/conn/ssl/SSLConnectionSocketFactory.java ignores the
    http.socket.timeout configuration setting during an SSL handshake, which
    allows remote attackers to cause a denial of service (HTTPS call hang)
    via unspecified vectors. [bsc#945190, CVE-2015-5262]
  • org.apache.http.conn.ssl.AbstractVerifier does not properly verify that
    the server hostname matches a domain name in the subject’s Common Name
    (CN) or subjectAltName field of the X.509 certificate, which allows MITM
    attackers to spoof SSL servers via a “CN=” string in a field in the
    distinguished name (DN)
    of a certificate. [bsc#1178171, CVE-2014-3577]

This update was imported from the SUSE:SLE-15-SP2:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.2:

    zypper in -t patch openSUSE-2020-1875=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.2noarch< - openSUSE Leap 15.2 (noarch):- openSUSE Leap 15.2 (noarch):.noarch.rpm

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N