Vulnerabilities > CVE-2013-2100 - Cryptographic Issues vulnerability in Gentoo Portage 2.1.12
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The urlopen function in pym/portage/util/_urlopen.py in Gentoo Portage 2.1.12, when using HTTPS, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and modify binary package lists via a crafted certificate.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-201507-16.NASL |
description | The remote host is affected by the vulnerability described in GLSA-201507-16 (Portage: Man-in-the-middle attack) Portage does not verify X.509 SSL certificates properly if HTTPS is used. Impact : A remote attacker can spoof servers and modify binary package lists via specially crafted certificates. Workaround : There is no known workaround at this time. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 86085 |
published | 2015-09-23 |
reporter | This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/86085 |
title | GLSA-201507-16 : Portage: Man-in-the-middle attack |
code |
|
References
- http://openwall.com/lists/oss-security/2013/05/15/5
- http://openwall.com/lists/oss-security/2013/05/15/5
- http://openwall.com/lists/oss-security/2013/05/16/3
- http://openwall.com/lists/oss-security/2013/05/16/3
- http://www.securityfocus.com/bid/59878
- http://www.securityfocus.com/bid/59878
- https://bugs.gentoo.org/show_bug.cgi?id=469888
- https://bugs.gentoo.org/show_bug.cgi?id=469888
- https://exchange.xforce.ibmcloud.com/vulnerabilities/84315
- https://exchange.xforce.ibmcloud.com/vulnerabilities/84315
- https://security.gentoo.org/glsa/201507-16
- https://security.gentoo.org/glsa/201507-16