[arch-security] [ASA-201601-29] mbedtls: man-in-the-middle
Remi Gacogne
rgacogne at archlinux.org
Mon Jan 25 22:01:12 UTC 2016
Arch Linux Security Advisory ASA-201601-29
==========================================
Severity: Medium
Date : 2016-01-25
CVE-ID : CVE-2015-7575
Package : mbedtls
Type : man-in-the-middle
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
Summary
=======
The package mbedtls before version 2.2.1-1 is vulnerable to
man-in-the-middle.
Resolution
==========
Upgrade to 2.2.1-1.
# pacman -Syu "mbedtls>=2.2.1-1"
The problem has been fixed upstream in version 2.2.1.
Workaround
==========
None.
Description
===========
mbedTLS before 2.2.1 is vulnerable to the SLOTH attack, breaking MD5
signatures potentially used during TLS 1.2 handshakes to impersonate a
TLS server.
Impact
======
A remote attacker might be able to impersonate a TLS server, acting as a
man-in-the-middle.
References
==========
https://bugs.archlinux.org/task/47783
https://access.redhat.com/security/cve/CVE-2015-7575
http://www.mitls.org/pages/attacks/SLOTH
https://tls.mbed.org/tech-updates/releases/mbedtls-2.2.1-2.1.4-1.3.16-and-polarssl.1.2.19-released
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20160125/b48092a1/attachment.asc>
More information about the arch-security
mailing list