CERTA-2011-AVI-493

Vulnerability from certfr_avis - Published: 2011-09-02 - Updated: 2011-09-12

Des certificats frauduleux ont été émis par une autorité de certification et peuvent servir à authentifier à tort des ordinateurs.

Description

Une vulnérabilité de l'autorité de certification (CA) DigiNotar a permis l'émission frauduleuse de certificats sur plusieurs domaines.

L'un de ces faux certificats a été utilisé pour monter une attaque trompant les internautes.

Solution

Certains éditeurs ont supprimé se la liste des certificats préinstallés dans leurs logiciels, ou simplement ou desactivé, le certificat de l'autorité DigiNotar.

Se référer aux bulletins de sécurité des éditeurs pour l'obtention des correctifs (cf. section Documentation).

Tous les systèmes utilisant des certificats SSL pour l'authentification, en particulier les navigateurs.

Impacted products
Vendor Product Description

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eTous les syst\u00e8mes utilisant des  certificats SSL pour l\u0027authentification, en particulier les  navigateurs.\u003c/p\u003e",
  "content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 de l\u0027autorit\u00e9 de certification (CA) DigiNotar a permis\nl\u0027\u00e9mission frauduleuse de certificats sur plusieurs domaines.\n\nL\u0027un de ces faux certificats a \u00e9t\u00e9 utilis\u00e9 pour monter une attaque\ntrompant les internautes.\n\n## Solution\n\nCertains \u00e9diteurs ont supprim\u00e9 se la liste des certificats pr\u00e9install\u00e9s\ndans leurs logiciels, ou simplement ou desactiv\u00e9, le certificat de\nl\u0027autorit\u00e9 DigiNotar.\n\nSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 des \u00e9diteurs pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2011-09-02T00:00:00",
  "last_revision_date": "2011-09-12T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla    2011/mfsa2011-34 du 30 ao\u00fbt 2011 :",
      "url": "http://www.mozilla.org/security/announce/2011/mfsa2011-34.html"
    },
    {
      "title": "Bulletin du GOVCERT.NL du 31 ao\u00fbt 2011 :",
      "url": "http://www.govcert.nl/english/service-provision/knowledge-and-publication/factsheets/factsheet-fraudulent-issued-security-certificat-discovered.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Debian DSA 2299 du 31 ao\u00fbt 2011 :",
      "url": "http://www.debian.org/security/2011/dsa-2299"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Apple HT4920 du 09 septembre 2011 :",
      "url": "http://support.apple.com/kb/HT4920"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft 2607712 du 29 ao\u00fbt 2011 :",
      "url": "http://www.microsoft.com/france/technet/security/advisory/2607712.mspx"
    }
  ],
  "reference": "CERTA-2011-AVI-493",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2011-09-02T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Apple.",
      "revision_date": "2011-09-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "Des certificats frauduleux ont \u00e9t\u00e9 \u00e9mis par une autorit\u00e9 de\ncertification et peuvent servir \u00e0 authentifier \u00e0 tort des ordinateurs.\n",
  "title": "Certificats SSL frauduleux",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Billet de l\u0027US-CERT du 30 ao\u00fbt 2011",
      "url": "http://www.us-cert.gov/current/#fraudulent_diginotar_ssl_certificate"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…